Vulnerability Name: | CVE-2019-6035 (CCN-173025) | ||||||||||||
Assigned: | 2019-12-12 | ||||||||||||
Published: | 2019-12-12 | ||||||||||||
Updated: | 2020-01-04 | ||||||||||||
Summary: | Open redirect vulnerability in Athenz v1.8.24 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-601 | ||||||||||||
Vulnerability Consequences: | Other | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-6035 Source: CCN Type: JVN#57070811 Athenz vulnerable to open redirect Source: MISC Type: Third Party Advisory http://jvn.jp/en/jp/JVN57070811/index.html Source: XF Type: UNKNOWN athenz-open-redirect(173025) Source: CCN Type: athenz GIT Repository GitHub - yahoo/athenz: Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as serving/runtime (decentralized authorization) use cases. Source: MISC Type: Product https://github.com/yahoo/athenz Source: MISC Type: Patch, Third Party Advisory https://github.com/yahoo/athenz/pull/700 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |