Open redirect in Drupal - CVE-2015-2750,CVE-2015-2749
Published: September 14, 2016
Vulnerability identifier: #VU436
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-2750,CVE-2015-2749
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Drupal
Affected software:
Drupal
Drupal
Detailed vulnerability description
The vulnerability allows a malicious user to perform potential social engineering attacks.
The weakness exists due to using of "destinations" query string parameter in malicious purposes. A remote attacker can trick the valid user into using of specially constructed URL for redirecting a victim to a 3rd party website. External URLs also can lead some URL-related API functions to open redirect vulnerabilities.
Successful exploitation of this vulnerability may result in potential social engineering attacks.
The weakness exists due to using of "destinations" query string parameter in malicious purposes. A remote attacker can trick the valid user into using of specially constructed URL for redirecting a victim to a 3rd party website. External URLs also can lead some URL-related API functions to open redirect vulnerabilities.
Successful exploitation of this vulnerability may result in potential social engineering attacks.
How to mitigate CVE-2015-2750,CVE-2015-2749
Update 6.x to 6.35.
https://www.drupal.org/drupal-6.35-release-notes
Update 7.x to 7.35.
https://www.drupal.org/drupal-7.35-release-notes
https://www.drupal.org/drupal-6.35-release-notes
Update 7.x to 7.35.
https://www.drupal.org/drupal-7.35-release-notes