First published: Mon Feb 12 2018(Updated: )
Authenticate/SWT in Progress Sitefinity 9.1 has an open redirect issue in which an authentication token is sent to the redirection target, if the target is specified using a certain %40 syntax. This is fixed in 10.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Sitefinity | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18178 is an open redirect vulnerability in Authenticate/SWT in Progress Sitefinity 9.1.
The severity of CVE-2017-18178 is medium with a CVSS score of 6.1.
CVE-2017-18178 allows an attacker to redirect users to a malicious website by manipulating their authentication token.
To fix CVE-2017-18178, update to Progress Sitefinity 10.1 or later.
Yes, you can find additional information about CVE-2017-18178 at the following links: - [Packet Storm Security](https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html) - [SEC Consult](https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html)