TemplateMan Update [Fri Sep 29 05:57:07 UTC 2023] 🤖

patch-1
GitHub Action 2023-09-29 05:57:07 +00:00
parent b26104cafe
commit 77bfd17949
1 changed files with 6 additions and 5 deletions

View File

@ -6,21 +6,22 @@ info:
severity: medium severity: medium
description: | description: |
Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING. Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.
remediation: |
Update to the latest version of Eleanor CMS to fix the open redirect vulnerability.
reference: reference:
- https://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html - https://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html
- https://nvd.nist.gov/vuln/detail/CVE-2014-9180 - https://nvd.nist.gov/vuln/detail/CVE-2014-9180
remediation: |
Update to the latest version of Eleanor CMS to fix the open redirect vulnerability.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/Au:N/C:N/I:P/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss-score: 5.0 cvss-score: 5
cve-id: CVE-2014-9180 cve-id: CVE-2014-9180
cwe-id: CWE-601 cwe-id: CWE-601
metadata: metadata:
verified: true max-request: 1
product: eleanor_cms product: eleanor_cms
vendor: eleanor-cms
shodan-query: html:"eleanor" shodan-query: html:"eleanor"
vendor: eleanor-cms
verified: true
tags: cve,cve2014,eleanor,cms,redirect tags: cve,cve2014,eleanor,cms,redirect
http: http: