Vulnerability Name:
CVE-2015-2750 (CCN-132150)
Assigned:
2015-03-18
Published:
2015-03-18
Updated:
2017-09-20
Summary:
Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.
CVSS v3 Severity:
6.1 Medium
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
)
5.3 Medium
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
None
7.4 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
)
6.4 Medium
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
High
Availibility (A):
None
CVSS v2 Severity:
5.8 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
None
6.8 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:S/C:N/I:C/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Complete
Availibility (A):
None
Vulnerability Type:
CWE-601
Vulnerability Consequences:
Gain Access
References:
Source: CONFIRM
Type: Third Party Advisory
http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8
Source: CONFIRM
Type: Patch, Third Party Advisory
http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93
Source: MITRE
Type: CNA
CVE-2015-2750
Source: DEBIAN
Type: Third Party Advisory
DSA-3200
Source: MLIST
Type: Mailing List, Patch, VDB Entry
[oss-security] 20150326 Re: CVE requests for Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001
Source: BID
Type: Third Party Advisory, VDB Entry
73219
Source: CCN
Type: BID-73219
Drupal Core Access Bypass and Open Redirection Vulnerabilities
Source: XF
Type: UNKNOWN
drupal-cve20152750-open-redirect(132150)
Source: CCN
Type: DRUPAL-SA-CORE-2015-001
Moderately Critical - Multiple Vulnerabilities
Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.drupal.org/SA-CORE-2015-001
Vulnerable Configuration:
Configuration 1
:
cpe:/a:drupal:drupal:6.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.9:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:6.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:dev:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.1:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.2:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.3:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.4:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.5:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.6:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.7:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.8:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.9:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.10:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.11:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.12:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.13:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.14:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.15:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.16:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.17:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.18:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.19:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.20:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.21:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.22:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.23:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.24:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.25:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.26:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.27:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.28:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.29:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.30:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.31:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.32:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.33:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.34:*:*:*:*:*:*:*
Configuration 2
:
cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:drupal:drupal:6.34:*:*:*:*:*:*:*
OR
cpe:/a:drupal:drupal:7.34:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:com.ubuntu.artful:def:20152750000
V
CVE-2015-2750 on Ubuntu 17.10 (artful) - medium.
2017-09-13
oval:com.ubuntu.xenial:def:201527500000000
V
CVE-2015-2750 on Ubuntu 16.04 LTS (xenial) - medium.
2017-09-13
oval:com.ubuntu.trusty:def:20152750000
V
CVE-2015-2750 on Ubuntu 14.04 LTS (trusty) - medium.
2017-09-13
oval:com.ubuntu.xenial:def:20152750000
V
CVE-2015-2750 on Ubuntu 16.04 LTS (xenial) - medium.
2017-09-13
oval:com.ubuntu.precise:def:20152750000
V
CVE-2015-2750 on Ubuntu 12.04 LTS (precise) - medium.
2015-03-20
BACK
drupal
drupal 6.0
drupal
drupal 6.0 beta1
drupal
drupal 6.0 beta2
drupal
drupal 6.0 beta3
drupal
drupal 6.0 beta4
drupal
drupal 6.0 dev
drupal
drupal 6.0 rc1
drupal
drupal 6.0 rc2
drupal
drupal 6.0 rc3
drupal
drupal 6.0 rc4
drupal
drupal 6.1
drupal
drupal 6.2
drupal
drupal 6.3
drupal
drupal 6.4
drupal
drupal 6.5
drupal
drupal 6.6
drupal
drupal 6.7
drupal
drupal 6.8
drupal
drupal 6.9
drupal
drupal 6.10
drupal
drupal 6.11
drupal
drupal 6.12
drupal
drupal 6.13
drupal
drupal 6.14
drupal
drupal 6.15
drupal
drupal 6.16
drupal
drupal 6.17
drupal
drupal 6.18
drupal
drupal 6.19
drupal
drupal 6.20
drupal
drupal 6.21
drupal
drupal 6.22
drupal
drupal 6.23
drupal
drupal 6.24
drupal
drupal 6.25
drupal
drupal 6.26
drupal
drupal 6.27
drupal
drupal 6.28
drupal
drupal 6.29
drupal
drupal 6.30
drupal
drupal 6.31
drupal
drupal 6.32
drupal
drupal 6.33
drupal
drupal 6.34
drupal
drupal 7.0
drupal
drupal 7.0 alpha1
drupal
drupal 7.0 alpha2
drupal
drupal 7.0 alpha3
drupal
drupal 7.0 alpha4
drupal
drupal 7.0 alpha5
drupal
drupal 7.0 alpha6
drupal
drupal 7.0 alpha7
drupal
drupal 7.0 beta1
drupal
drupal 7.0 beta2
drupal
drupal 7.0 beta3
drupal
drupal 7.0 dev
drupal
drupal 7.0 rc1
drupal
drupal 7.0 rc2
drupal
drupal 7.0 rc3
drupal
drupal 7.0 rc4
drupal
drupal 7.1
drupal
drupal 7.2
drupal
drupal 7.3
drupal
drupal 7.4
drupal
drupal 7.5
drupal
drupal 7.6
drupal
drupal 7.7
drupal
drupal 7.8
drupal
drupal 7.9
drupal
drupal 7.10
drupal
drupal 7.11
drupal
drupal 7.12
drupal
drupal 7.13
drupal
drupal 7.14
drupal
drupal 7.15
drupal
drupal 7.16
drupal
drupal 7.17
drupal
drupal 7.18
drupal
drupal 7.19
drupal
drupal 7.20
drupal
drupal 7.21
drupal
drupal 7.22
drupal
drupal 7.23
drupal
drupal 7.24
drupal
drupal 7.25
drupal
drupal 7.26
drupal
drupal 7.27
drupal
drupal 7.28
drupal
drupal 7.29
drupal
drupal 7.30
drupal
drupal 7.31
drupal
drupal 7.32
drupal
drupal 7.33
drupal
drupal 7.34
debian
debian linux 8.0
debian
debian linux 9.0
drupal
drupal 6.34
drupal
drupal 7.34