First published: Tue Apr 12 2016(Updated: )
Open redirect vulnerability in the valid_back_url function in app/controllers/application_controller.rb in Redmine before 2.6.7, 3.0.x before 3.0.5, and 3.1.x before 3.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted back_url parameter, as demonstrated by "@attacker.com," a different vulnerability than CVE-2014-1985.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Debian | =8.0 | |
Redmine | <=2.6.6 | |
Redmine | =2.5.1 | |
Redmine | =3.0.0 | |
Redmine | =3.0.1 | |
Redmine | =3.0.2 | |
Redmine | =3.0.3 | |
Redmine | =3.0.4 | |
Redmine | =3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8474 is classified as a high severity vulnerability due to its potential to enable phishing attacks.
To fix CVE-2015-8474, upgrade Redmine to version 2.6.7 or later, or to 3.0.5 or later for 3.0.x, and 3.1.1 or later for 3.1.x.
CVE-2015-8474 affects Redmine versions prior to 2.6.7, all 3.0.x versions before 3.0.5, and all 3.1.x versions before 3.1.1.
Yes, CVE-2015-8474 can be exploited remotely by attackers to redirect users to malicious sites.
CVE-2015-8474 can be exploited to conduct phishing attacks by redirecting users to arbitrary web sites.