An Open Redirect vulnerability was discovered in Revive Adserver version < 5.0.5 and reported by HackerOne user hoangn144. A remote attacker could trick logged-in users to open a specifically crafted link and have them redirected to any destination.The CSRF protection of the “/www/admin/*-modify.php” could be skipped if no meaningful parameter was sent. No action was performed, but the user was still redirected to the target page, specified via the “returnurl” GET parameter.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/794144 | Exploit Third Party Advisory |
| https://www.revive-adserver.com/security/revive-sa-2020-002/ | Vendor Advisory |
| https://hackerone.com/reports/794144 | Exploit Third Party Advisory |
| https://www.revive-adserver.com/security/revive-sa-2020-002/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-04-03 21:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8143
Mitre link : CVE-2020-8143
CVE.ORG link : CVE-2020-8143
JSON object : View
Products Affected
revive-adserver
- revive_adserver
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
