First published: Wed Jul 02 2014(Updated: )
Multiple open redirect vulnerabilities in the Suricata package before 1.0.6 for pfSense through 2.1.4 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the referer parameter to suricata_rules_flowbits.php or (2) the returl parameter to suricata_select_alias.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pfSense | <=2.1.4 | |
pfSense | =2.1.3 | |
Netgate pfSense ACME Package | <=1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4696 has a moderate severity rating as it allows attackers to conduct phishing attacks through open redirects.
To fix CVE-2014-4696, update the pfSense environment to a version above 2.1.4 or the Suricata package to a version above 1.0.6.
CVE-2014-4696 affects pfSense versions up to 2.1.4 and Suricata package versions up to 1.0.5.
CVE-2014-4696 can be exploited to redirect users to arbitrary websites, enabling phishing and other malicious redirection attacks.
No, CVE-2014-4696 is not a vulnerability in versions of pfSense above 2.1.4 and Suricata packages above 1.0.6.