Vulnerability Name:
CVE-2015-2749 (CCN-101690)
Assigned:
2015-03-18
Published:
2015-03-18
Updated:
2017-09-21
Summary:
Open redirect vulnerability in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the destination parameter.
CVSS v3 Severity:
6.1 Medium
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
None
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
5.8 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
)
4.3 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
None
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
)
3.7 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-601
Vulnerability Consequences:
Informational
References:
Source: CONFIRM
Type: Patch, Vendor Advisory
http://cgit.drupalcode.org/drupal/commit/?id=d2304f840c43c190c6e136ee9901ed9797b4c3ca
Source: MITRE
Type: CNA
CVE-2015-2749
Source: DEBIAN
Type: Third Party Advisory
DSA-3200
Source: MLIST
Type: Mailing List, Patch, VDB Entry
[oss-security] 20150326 Re: CVE requests for Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001
Source: BID
Type: Third Party Advisory, VDB Entry
73219
Source: CCN
Type: BID-73219
Drupal Core Access Bypass and Open Redirection Vulnerabilities
Source: CONFIRM
Type: Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1204753
Source: XF
Type: UNKNOWN
drupal-core-destination-open-redirect(101690)
Source: CCN
Type: DRUPAL-SA-CORE-2015-001
Drupal Core - Moderately Critical - Multiple Vulnerabilities
Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.drupal.org/SA-CORE-2015-001
Vulnerable Configuration:
Configuration 1
:
cpe:/a:drupal:drupal:6.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.9:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.9:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.34:*:*:*:*:*:*:*
Configuration 2
:
cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:drupal:drupal:6.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.34:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:com.ubuntu.artful:def:20152749000
V
CVE-2015-2749 on Ubuntu 17.10 (artful) - medium.
2017-09-13
oval:com.ubuntu.xenial:def:201527490000000
V
CVE-2015-2749 on Ubuntu 16.04 LTS (xenial) - medium.
2017-09-13
oval:com.ubuntu.trusty:def:20152749000
V
CVE-2015-2749 on Ubuntu 14.04 LTS (trusty) - medium.
2017-09-13
oval:com.ubuntu.xenial:def:20152749000
V
CVE-2015-2749 on Ubuntu 16.04 LTS (xenial) - medium.
2017-09-13
oval:com.ubuntu.precise:def:20152749000
V
CVE-2015-2749 on Ubuntu 12.04 LTS (precise) - medium.
2015-03-20
BACK
drupal
drupal 6.0
drupal
drupal 6.0 beta1
drupal
drupal 6.0 beta2
drupal
drupal 6.0 beta3
drupal
drupal 6.0 beta4
drupal
drupal 6.0 dev
drupal
drupal 6.0 rc1
drupal
drupal 6.0 rc2
drupal
drupal 6.0 rc3
drupal
drupal 6.0 rc4
drupal
drupal 6.1
drupal
drupal 6.2
drupal
drupal 6.3
drupal
drupal 6.4
drupal
drupal 6.5
drupal
drupal 6.6
drupal
drupal 6.7
drupal
drupal 6.8
drupal
drupal 6.9
drupal
drupal 6.10
drupal
drupal 6.11
drupal
drupal 6.12
drupal
drupal 6.13
drupal
drupal 6.14
drupal
drupal 6.15
drupal
drupal 6.16
drupal
drupal 6.17
drupal
drupal 6.18
drupal
drupal 6.19
drupal
drupal 6.20
drupal
drupal 6.21
drupal
drupal 6.22
drupal
drupal 6.23
drupal
drupal 6.24
drupal
drupal 6.25
drupal
drupal 6.26
drupal
drupal 6.27
drupal
drupal 6.28
drupal
drupal 6.29
drupal
drupal 6.30
drupal
drupal 6.31
drupal
drupal 6.32
drupal
drupal 6.33
drupal
drupal 6.34
drupal
drupal 7.0
drupal
drupal 7.0 alpha1
drupal
drupal 7.0 alpha2
drupal
drupal 7.0 alpha3
drupal
drupal 7.0 alpha4
drupal
drupal 7.0 alpha5
drupal
drupal 7.0 alpha6
drupal
drupal 7.0 alpha7
drupal
drupal 7.0 beta1
drupal
drupal 7.0 beta2
drupal
drupal 7.0 beta3
drupal
drupal 7.0 dev
drupal
drupal 7.0 rc1
drupal
drupal 7.0 rc2
drupal
drupal 7.0 rc3
drupal
drupal 7.0 rc4
drupal
drupal 7.1
drupal
drupal 7.2
drupal
drupal 7.3
drupal
drupal 7.4
drupal
drupal 7.5
drupal
drupal 7.6
drupal
drupal 7.7
drupal
drupal 7.8
drupal
drupal 7.9
drupal
drupal 7.10
drupal
drupal 7.11
drupal
drupal 7.12
drupal
drupal 7.13
drupal
drupal 7.14
drupal
drupal 7.15
drupal
drupal 7.16
drupal
drupal 7.17
drupal
drupal 7.18
drupal
drupal 7.19
drupal
drupal 7.20
drupal
drupal 7.21
drupal
drupal 7.22
drupal
drupal 7.23
drupal
drupal 7.24
drupal
drupal 7.25
drupal
drupal 7.26
drupal
drupal 7.27
drupal
drupal 7.28
drupal
drupal 7.29
drupal
drupal 7.30
drupal
drupal 7.31
drupal
drupal 7.32
drupal
drupal 7.33
drupal
drupal 7.34
debian
debian linux 8.0
debian
debian linux 9.0
drupal
drupal 6.34
drupal
drupal 7.34