CVE-2020-21998

Beschreibung:
In HomeAutomation 3.3.2 input passed via the ‚redirect‘ GET parameter in ‚api.php‘ script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

CWE: CWE-601 CWE-78

CVSS-Bewertung
CVSS 2: MEDIUM – 5.8 (Version: 2.0)
CVSS 3: MEDIUM – 6.1 (Version: 3.1)

Links:

NVD – CVE-2020-21998
CVE – CVE-2020-21998

Link (max. 20) Quelle Tags
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php MISC Exploit Third Party Advisory VDB Entry
https://cxsecurity.com/issue/WLB-2019120132 MISC Exploit Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-21-491/ MISC Third Party Advisory VDB Entry Vendor Advisory
[oss-security] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Patch Third Party Advisory
[ofbiz-dev] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Vendor Advisory Vendor Advisory
[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07 MLIST Mailing List Patch Vendor Advisory
[announce] 20210427 [CVE-2021-29200] RCE vulnerability in latest Apache OFBiz due to Java serialisation using RMI MLIST Mailing List Vendor Advisory Vendor Advisory
[announce] 20210427 [CVE-2021-30128] Unsafe deserialization in OFBiz MLIST Mailing List Mitigation Vendor Advisory

Quelle: NVD – CVE-2020-21998
Datum Veröffentlichung: 2021-04-27T18:15Z, Datum letzte Änderung: 2021-05-06T14:19Z