Vulnerabilities (CVE)

Filtered by CWE-601
Total 962 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-23754 1 Joomla 1 Joomla\! 2023-06-06 N/A 6.1 MEDIUM
An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.
CVE-2023-20884 3 Linux, Microsoft, Vmware 6 Linux Kernel, Windows, Cloud Foundation and 3 more 2023-06-05 N/A 6.1 MEDIUM
VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure.
CVE-2023-34224 1 Jetbrains 1 Teamcity 2023-06-02 N/A 4.8 MEDIUM
In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible
CVE-2023-32218 1 Avaya 1 Ix Workforce Engagement 2023-06-02 N/A 6.1 MEDIUM
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CVE-2023-28370 1 Tornadoweb 1 Tornado 2023-06-01 N/A 6.1 MEDIUM
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
CVE-2023-31245 2 Control4, Snapone 13 Ca-1, Ca-10, Ea-1 and 10 more 2023-05-31 N/A 6.1 MEDIUM
Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
CVE-2022-0637 1 Mozilla 1 Pollbot 2023-05-26 N/A 6.1 MEDIUM
open redirect in pollbot (pollbot.services.mozilla.com) in versions before 1.4.6
CVE-2020-11515 1 Rankmath 1 Seo 2023-05-26 5.8 MEDIUM 6.1 MEDIUM
The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).
CVE-2023-32068 1 Xwiki 1 Xwiki 2023-05-24 N/A 6.1 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 14.10.4 it's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect. The issue has now been patched against all patterns that are known for performing redirects. This issue has been patched in XWiki 14.10.4 and 15.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-31134 1 Tauri 1 Tauri 2023-05-16 N/A 5.4 MEDIUM
Tauri is software for building applications for multi-platform deployment. The Tauri IPC is usually strictly isolated from external websites, but in versions 1.0.0 until 1.0.9, 1.1.0 until 1.1.4, and 1.2.0 until 1.2.5, the isolation can be bypassed by redirecting an existing Tauri window to an external website. This is either possible by an application implementing a feature for users to visit arbitrary websites or due to a bug allowing the open redirect. This allows the external website access to the IPC layer and therefore to all configured and exposed Tauri API endpoints and application specific implemented Tauri commands. This issue has been patched in versions 1.0.9, 1.1.4, and 1.2.5. As a workaround, prevent arbitrary input in redirect features and/or only allow trusted websites access to the IPC.
CVE-2023-25829 1 Esri 1 Portal For Arcgis 2023-05-15 N/A 6.1 MEDIUM
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
CVE-2020-21038 1 Typecho 1 Typecho 2023-05-11 N/A 6.1 MEDIUM
Open redirect vulnerability in typecho 1.1-17.10.30-release via the referer parameter to Login.php.
CVE-2023-0155 1 Gitlab 1 Gitlab 2023-05-09 N/A 5.4 MEDIUM
An issue has been discovered in GitLab CE/EE affecting all versions before 15.8.5, 15.9.4, 15.10.1. Open redirects was possible due to framing arbitrary content on any page allowing user controlled markdown
CVE-2023-2000 1 Mattermost 1 Mattermost Desktop 2023-05-09 N/A 5.4 MEDIUM
Mattermost Desktop App fails to validate a mattermost server redirection and navigates to an arbitrary website
CVE-2023-22729 1 Silverstripe 1 Framework 2023-05-04 N/A 6.1 MEDIUM
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
CVE-2023-26494 1 Thethingsnetwork 1 Lorawan-stack 2023-05-03 N/A 6.1 MEDIUM
lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.
CVE-2021-3654 2 Openstack, Redhat 2 Nova, Openstack Platform 2023-05-03 4.0 MEDIUM 6.1 MEDIUM
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
CVE-2023-29204 1 Xwiki 1 Xwiki 2023-04-26 N/A 6.1 MEDIUM
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
CVE-2022-46886 1 Servicenow 1 Servicenow 2023-04-24 N/A 6.1 MEDIUM
There exists an open redirect within the response list update functionality of ServiceNow. This allows attackers to redirect users to arbitrary domains when clicking on a URL within a service-now domain.
CVE-2017-20119 1 Trueconf 1 Server 2023-04-20 5.8 MEDIUM 6.1 MEDIUM
A vulnerability classified as problematic has been found in TrueConf Server 4.3.7. This affects an unknown part of the file /admin/general/change-lang. The manipulation of the argument redirect_url leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.