When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
CPE | Name | Operator | Version |
---|---|---|---|
knox | eq | 0.2.0-rc2 | |
knox | eq | 1.6.0-release | |
knox | eq | 0.10.0-branch | |
knox | eq | 1.4.0-branch | |
knox | eq | 0.5.0-branch | |
knox | eq | 0.4.0-branch | |
knox | eq | 0.14.0-branch | |
knox | eq | 1.5.0-branch | |
knox | eq | 1.1.0-branch | |
knox | eq | 1.6.0-RC1 |