First published: Tue Jan 02 2024(Updated: )
follow-redirects could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Web sites.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/follow-redirects | <1.15.4 | 1.15.4 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
follow-redirects | <1.15.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26159 has been classified as a moderate severity vulnerability due to its potential for phishing attacks.
To fix CVE-2023-26159, upgrade the follow-redirects package to version 1.15.4 or later.
CVE-2023-26159 affects the follow-redirects package versions prior to 1.15.4 and certain versions of IBM Cognos Controller.
Yes, CVE-2023-26159 can be exploited remotely by an attacker using a specially crafted URL to redirect users.
CVE-2023-26159 is classified as an open redirect vulnerability.