First published: Thu Oct 24 2013(Updated: )
Open redirect vulnerability in the AbstractAuthenticationFormServlet in the Auth Core (org.apache.sling.auth.core) bundle before 1.1.4 in Apache Sling allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the resource parameter, related to "a custom login form and XSS."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.sling:org.apache.sling.auth.core | <1.1.4 | 1.1.4 |
Apache Sling API | ||
Apache Sling Auth Core Component | <=1.1.2 | |
Apache Sling Auth Core Component | =1.0.2 | |
Apache Sling Auth Core Component | =1.0.4 | |
Apache Sling Auth Core Component | =1.0.6 | |
Apache Sling Auth Core Component | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4390 is classified as a medium severity vulnerability due to its potential to enable phishing attacks through open redirects.
To mitigate CVE-2013-4390, upgrade to Apache Sling versions 1.1.4 or later, which contain the patch for this vulnerability.
An open redirect vulnerability, such as CVE-2013-4390, allows attackers to manipulate the URL to redirect users to malicious sites without their consent.
CVE-2013-4390 affects Apache Sling Auth Core Component versions prior to 1.1.4, including several earlier versions.
Users and administrators of Apache Sling versions prior to 1.1.4 are impacted by CVE-2013-4390 due to the open redirect vulnerability.