First published: Thu Oct 23 2014(Updated: )
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open edX | <=2.8.10 | |
Open edX | =2.8 | |
Open edX | =2.8.1 | |
Open edX | =2.8.2 | |
Open edX | =2.8.3 | |
Open edX | =2.8.4 | |
Open edX | =2.8.5 | |
Open edX | =2.8.6 | |
Open edX | =2.8.7 | |
Open edX | =2.8.8 | |
Open edX | =2.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2230 is considered a high severity vulnerability due to its potential to facilitate phishing attacks.
To fix CVE-2014-2230, upgrade to OpenX version 2.8.11 or later to mitigate the open redirect vulnerability.
CVE-2014-2230 can be exploited to conduct phishing attacks by redirecting users to arbitrary malicious websites.
OpenX versions 2.8.10 and earlier are affected by CVE-2014-2230.
CVE-2014-2230 is a server-side vulnerability that allows attackers to influence the behavior of the web application.