Vulnerability Description
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Web2Py | Web2Py | 2.9.11 |
Related Weaknesses (CWE)
References
- https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0PatchThird Party Advisory
- https://github.com/web2py/web2py/issues/731Third Party Advisory
- https://github.com/web2py/web2py/commit/e31a099cb3456fef471886339653430ae59056b0PatchThird Party Advisory
- https://github.com/web2py/web2py/issues/731Third Party Advisory
FAQ
What is CVE-2015-6961?
CVE-2015-6961 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/lo...
How severe is CVE-2015-6961?
CVE-2015-6961 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6961?
Check the references section above for vendor advisories and patch information. Affected products include: Web2Py Web2Py.