Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.
References
| Link | Resource |
|---|---|
| https://avideo.tube/ | Product |
| https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c | Patch Third Party Advisory |
| https://avideo.tube/ | Product |
| https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://avideo.tube/ - Product | |
| References | () https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c - Patch, Third Party Advisory |
Information
Published : 2022-04-05 16:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27463
Mitre link : CVE-2022-27463
CVE.ORG link : CVE-2022-27463
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
