New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open Redirect vulnerability - index.php #1

Closed
cloudsriseup opened this Issue Feb 8, 2016 · 4 comments

Comments

Projects
None yet
2 participants
@cloudsriseup

cloudsriseup commented Feb 8, 2016

The file securityonion-capme/capme/pcap/index.php passes unvalidated data to an HTTP redirect function on line 3. Allowing unvalidated input to control the URL used in a redirect can aid phishing attacks and other redirect attacks.

@dougburks

This comment has been minimized.

Show comment
Hide comment
@dougburks

dougburks Feb 8, 2016

Contributor

Hi lordappsec,

I'll take a look and see what we need to do.

Thanks!

Contributor

dougburks commented Feb 8, 2016

Hi lordappsec,

I'll take a look and see what we need to do.

Thanks!

@dougburks

This comment has been minimized.

Show comment
Hide comment
@dougburks

dougburks Feb 8, 2016

Contributor

Hi @lordappsec,

Please take a look at the updated file:
https://github.com/Security-Onion-Solutions/securityonion-capme/blob/master/capme/pcap/index.php

Please let me know what you think.

Thanks!

Contributor

dougburks commented Feb 8, 2016

Hi @lordappsec,

Please take a look at the updated file:
https://github.com/Security-Onion-Solutions/securityonion-capme/blob/master/capme/pcap/index.php

Please let me know what you think.

Thanks!

@cloudsriseup

This comment has been minimized.

Show comment
Hide comment
@cloudsriseup

cloudsriseup Feb 8, 2016

Looks adequate. Good luck!

cloudsriseup commented Feb 8, 2016

Looks adequate. Good luck!

@dougburks

This comment has been minimized.

Show comment
Hide comment

@dougburks dougburks closed this Feb 10, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment