Lack of "current" GET parameter validation during the action of changing a language leads to an open redirect vulnerability.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2024/01/CVE-2023-6552/ | Third Party Advisory |
| https://cert.pl/posts/2024/01/CVE-2023-6552/ | Third Party Advisory |
| https://github.com/TasmoAdmin/TasmoAdmin/pull/1039 | Patch |
Configurations
History
11 Jan 2024, 21:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tasmoadmin:tasmoadmin:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Tasmoadmin tasmoadmin
Tasmoadmin |
|
| References | () https://cert.pl/en/posts/2024/01/CVE-2023-6552/ - Third Party Advisory | |
| References | () https://cert.pl/posts/2024/01/CVE-2023-6552/ - Third Party Advisory | |
| References | () https://github.com/TasmoAdmin/TasmoAdmin/pull/1039 - Patch |
Information
Published : 2024-01-08 13:15
Updated : 2024-01-11 21:13
NVD link : CVE-2023-6552
Mitre link : CVE-2023-6552
CVE.ORG link : CVE-2023-6552
JSON object : View
Products Affected
tasmoadmin
- tasmoadmin
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
