First published: Wed Mar 12 2014(Updated: )
Open redirect vulnerability in DotNetNuke (DNN) before 6.2.9 and 7.x before 7.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/DotNetNuke.Core | >=7.0<7.1.1 | 7.1.1 |
nuget/DotNetNuke.Core | <6.2.9 | 6.2.9 |
DNN (DotNetNuke) | <=6.2.8 | |
DNN (DotNetNuke) | =1.0.6 | |
DNN (DotNetNuke) | =1.0.7 | |
DNN (DotNetNuke) | =1.0.8 | |
DNN (DotNetNuke) | =1.0.9 | |
DNN (DotNetNuke) | =1.0.10d | |
DNN (DotNetNuke) | =1.0.10e | |
DNN (DotNetNuke) | =2.1.1 | |
DNN (DotNetNuke) | =2.1.2 | |
DNN (DotNetNuke) | =3.0.7 | |
DNN (DotNetNuke) | =3.0.8 | |
DNN (DotNetNuke) | =3.0.11 | |
DNN (DotNetNuke) | =3.1.0 | |
DNN (DotNetNuke) | =3.3.5 | |
DNN (DotNetNuke) | =4.0 | |
DNN (DotNetNuke) | =4.3.5 | |
DNN (DotNetNuke) | =4.4.1 | |
DNN (DotNetNuke) | =4.5.2 | |
DNN (DotNetNuke) | =4.5.4 | |
DNN (DotNetNuke) | =4.5.5 | |
DNN (DotNetNuke) | =4.6.0 | |
DNN (DotNetNuke) | =4.6.1 | |
DNN (DotNetNuke) | =4.6.2 | |
DNN (DotNetNuke) | =4.7.0 | |
DNN (DotNetNuke) | =4.8.0 | |
DNN (DotNetNuke) | =4.8.1 | |
DNN (DotNetNuke) | =4.8.2 | |
DNN (DotNetNuke) | =4.8.3 | |
DNN (DotNetNuke) | =4.8.4 | |
DNN (DotNetNuke) | =4.9 | |
DNN (DotNetNuke) | =4.9.1 | |
DNN (DotNetNuke) | =4.9.2 | |
DNN (DotNetNuke) | =5.0 | |
DNN (DotNetNuke) | =5.1 | |
DNN (DotNetNuke) | =5.1.1 | |
DNN (DotNetNuke) | =5.1.2 | |
DNN (DotNetNuke) | =5.1.3 | |
DNN (DotNetNuke) | =5.1.4 | |
DNN (DotNetNuke) | =5.05.01 | |
DNN (DotNetNuke) | =5.06.00 | |
DNN (DotNetNuke) | =6.0.0 | |
DNN (DotNetNuke) | =6.0.1 | |
DNN (DotNetNuke) | =6.0.2 | |
DNN (DotNetNuke) | =6.1.0 | |
DNN (DotNetNuke) | =6.1.1 | |
DNN (DotNetNuke) | =6.1.2 | |
DNN (DotNetNuke) | =6.1.3 | |
DNN (DotNetNuke) | =6.1.4 | |
DNN (DotNetNuke) | =6.1.5 | |
DNN (DotNetNuke) | =6.2.0 | |
DNN (DotNetNuke) | =6.2.1 | |
DNN (DotNetNuke) | =6.2.2 | |
DNN (DotNetNuke) | =6.2.3 | |
DNN (DotNetNuke) | =6.2.4 | |
DNN (DotNetNuke) | =6.2.5 | |
DNN (DotNetNuke) | =6.2.6 | |
DNN (DotNetNuke) | =6.2.7 | |
DNN (DotNetNuke) | =7.0.0 | |
DNN (DotNetNuke) | =7.0.1 | |
DNN (DotNetNuke) | =7.0.2 | |
DNN (DotNetNuke) | =7.0.3 | |
DNN (DotNetNuke) | =7.0.4 | |
DNN (DotNetNuke) | =7.0.5 | |
DNN (DotNetNuke) | =7.0.6 | |
DNN (DotNetNuke) | =7.1.0 | |
<=6.2.8 | ||
=1.0.6 | ||
=1.0.7 | ||
=1.0.8 | ||
=1.0.9 | ||
=1.0.10d | ||
=1.0.10e | ||
=2.1.1 | ||
=2.1.2 | ||
=3.0.7 | ||
=3.0.8 | ||
=3.0.11 | ||
=3.1.0 | ||
=3.3.5 | ||
=4.0 | ||
=4.3.5 | ||
=4.4.1 | ||
=4.5.2 | ||
=4.5.4 | ||
=4.5.5 | ||
=4.6.0 | ||
=4.6.1 | ||
=4.6.2 | ||
=4.7.0 | ||
=4.8.0 | ||
=4.8.1 | ||
=4.8.2 | ||
=4.8.3 | ||
=4.8.4 | ||
=4.9 | ||
=4.9.1 | ||
=4.9.2 | ||
=5.0 | ||
=5.1 | ||
=5.1.1 | ||
=5.1.2 | ||
=5.1.3 | ||
=5.1.4 | ||
=5.05.01 | ||
=5.06.00 | ||
=6.0.0 | ||
=6.0.1 | ||
=6.0.2 | ||
=6.1.0 | ||
=6.1.1 | ||
=6.1.2 | ||
=6.1.3 | ||
=6.1.4 | ||
=6.1.5 | ||
=6.2.0 | ||
=6.2.1 | ||
=6.2.2 | ||
=6.2.3 | ||
=6.2.4 | ||
=6.2.5 | ||
=6.2.6 | ||
=6.2.7 | ||
=7.0.0 | ||
=7.0.1 | ||
=7.0.2 | ||
=7.0.3 | ||
=7.0.4 | ||
=7.0.5 | ||
=7.0.6 | ||
=7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7335 is considered a high severity vulnerability due to its potential to facilitate phishing attacks.
To fix CVE-2013-7335, update DotNetNuke to version 6.2.9 or later, or version 7.1.1 or later.
CVE-2013-7335 allows attackers to redirect users to malicious sites, potentially compromising user credentials and trust.
CVE-2013-7335 affects DotNetNuke versions prior to 6.2.9 and 7.x before 7.1.1.
Any organization utilizing the affected versions of DotNetNuke is vulnerable to the exploitation of CVE-2013-7335.