Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://hackerone.com/reports/1081406 | third party advisory exploit |
https://www.revive-adserver.com/security/revive-sa-2021-001/ | vendor advisory |
https://github.com/revive-adserver/revive-adserver/issues/1068 | issue tracking third party advisory |
http://seclists.org/fulldisclosure/2021/Jan/60 | mailing list third party advisory broken link |
http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html | vdb entry third party advisory |