First published: Tue Aug 20 2013(Updated: )
Open redirect vulnerability in the login page in Puppet Enterprise before 3.0.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the service parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppetlabs Puppet Enterprise | <=3.0.0 | |
Puppetlabs Puppet Enterprise | =2.5.1 | |
Puppetlabs Puppet Enterprise | =2.5.2 | |
Puppetlabs Puppet Enterprise | =2.8.0 | |
Puppetlabs Puppet Enterprise | =2.8.1 | |
Puppetlabs Puppet Enterprise | =2.8.2 | |
Puppetlabs Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4955 is classified as a medium severity vulnerability due to its potential for phishing attacks.
To fix CVE-2013-4955, you should upgrade to Puppet Enterprise version 3.0.1 or later.
CVE-2013-4955 affects users of Puppet Enterprise versions prior to 3.0.1 and specific versions 2.5.1, 2.5.2, 2.8.0, 2.8.1, 2.8.2, and 2.8.3.
CVE-2013-4955 is an open redirect vulnerability that allows attackers to redirect users to malicious sites.
CVE-2013-4955 can be exploited by attackers crafting a malicious URL in the service parameter of the login page.