First published: Wed Jul 02 2014(Updated: )
Multiple open redirect vulnerabilities in the Snort package before 3.0.13 for pfSense through 2.1.4 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the referer parameter to snort_rules_flowbits.php or (2) the returl parameter to snort_select_alias.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pfSense | <=2.1.4 | |
pfSense | =2.1.3 | |
Netgate pfSense ACME Package | <=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4695 has a medium severity rating as it allows attackers to exploit open redirect vulnerabilities to conduct phishing attacks.
To fix CVE-2014-4695, upgrade Snort package to version 3.0.13 or later in pfSense.
CVE-2014-4695 affects pfSense versions up to 2.1.4 and the Snort package versions up to 3.0.12.
An open redirect vulnerability allows an attacker to redirect users to an untrusted site, which can facilitate phishing attacks.
Users should immediately update their pfSense and Snort package to the latest secure versions to mitigate the risk.