All the vulnerabilites related to labjs_project - labjs
cve-2015-7943
Vulnerability from cvelistv5
Published
2017-10-18 18:00
Modified
2024-08-06 08:06
Severity ?
Summary
Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:06:31.133Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2598434"
          },
          {
            "name": "77293",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/77293"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2598426"
          },
          {
            "name": "DSA-3897",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3897"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.drupal.org/node/2598434"
        },
        {
          "name": "77293",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/77293"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.drupal.org/node/2598426"
        },
        {
          "name": "DSA-3897",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3897"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-7943",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.drupal.org/node/2598434",
              "refsource": "MISC",
              "url": "https://www.drupal.org/node/2598434"
            },
            {
              "name": "77293",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/77293"
            },
            {
              "name": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical"
            },
            {
              "name": "https://www.drupal.org/node/2598426",
              "refsource": "MISC",
              "url": "https://www.drupal.org/node/2598426"
            },
            {
              "name": "DSA-3897",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3897"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-7943",
    "datePublished": "2017-10-18T18:00:00",
    "dateReserved": "2015-10-23T00:00:00",
    "dateUpdated": "2024-08-06T08:06:31.133Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2017-10-18 18:29
Modified
2024-11-21 02:37
Summary
Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233.
Impacted products
Vendor Product Version
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.0
drupal drupal 7.1
drupal drupal 7.2
drupal drupal 7.3
drupal drupal 7.4
drupal drupal 7.5
drupal drupal 7.6
drupal drupal 7.7
drupal drupal 7.8
drupal drupal 7.9
drupal drupal 7.10
drupal drupal 7.11
drupal drupal 7.12
drupal drupal 7.13
drupal drupal 7.14
drupal drupal 7.15
drupal drupal 7.16
drupal drupal 7.17
drupal drupal 7.18
drupal drupal 7.19
drupal drupal 7.20
drupal drupal 7.21
drupal drupal 7.22
drupal drupal 7.23
drupal drupal 7.24
drupal drupal 7.25
drupal drupal 7.26
drupal drupal 7.27
drupal drupal 7.28
drupal drupal 7.29
drupal drupal 7.30
drupal drupal 7.31
drupal drupal 7.32
drupal drupal 7.33
drupal drupal 7.34
drupal drupal 7.35
drupal drupal 7.36
drupal drupal 7.37
drupal drupal 7.38
drupal drupal 7.39
drupal drupal 7.40
jquery_update_project jquery_update 7.x-2.0
jquery_update_project jquery_update 7.x-2.1
jquery_update_project jquery_update 7.x-2.2
jquery_update_project jquery_update 7.x-2.3
jquery_update_project jquery_update 7.x-2.4
jquery_update_project jquery_update 7.x-2.5
jquery_update_project jquery_update 7.x-2.6
labjs_project labjs 7.x-1.0
labjs_project labjs 7.x-1.0
labjs_project labjs 7.x-1.0
labjs_project labjs 7.x-1.1
labjs_project labjs 7.x-1.2
labjs_project labjs 7.x-1.3
labjs_project labjs 7.x-1.4
labjs_project labjs 7.x-1.5
labjs_project labjs 7.x-1.6
labjs_project labjs 7.x-1.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "48C33CAB-4633-418C-B162-20A2EC24E8DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "CC3B1750-17AD-4386-B6EE-1AFC9CDFB6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "9E0C1873-22A6-4CE9-853D-2A40BD3D9E62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "9F6DF608-0DA2-455F-AD28-7BE4A7548E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "7BCC306D-EB5D-4784-B0B1-B4F9370796F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "5639A5F3-CD18-451C-BA5A-3336C42BED83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "5B0A10CA-F59E-48AC-97E9-8476F63BAEDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "07B7917C-5934-4AFF-B3DB-BE9B099B27FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "16731B53-3CD1-4B98-947B-7621162D8DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "BD738402-A50E-4AEB-8F42-607F52DE5540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "199AC10C-6E65-409B-8658-E26240B27E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*",
              "matchCriteriaId": "2B378BEF-B070-4955-A6B3-8F2ACBA96832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "19EC9A36-5EDC-4519-802E-BEA69B18800A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8C281EA7-8AE1-4D5A-B03B-B3BE37740195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "024CF5B1-1875-4785-ACAF-35ECCC7914A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "5F446903-51AC-4FA3-BA90-C2EA59BBDB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE86CC5-956E-4F16-BE7B-2B1CAAEB5C40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0AC1B21-D3BE-4B6A-AE40-8B395E81DD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5E8A73-1C02-4900-BC30-83084DC8371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A92A41E3-BF0F-49BD-9F0F-5FDC11BF2499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "937C3149-3F34-40D8-964D-FB65EBDF0BC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90CD183A-3777-44F9-8CA6-8E802058D099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "68C0CC63-558B-4750-8293-926BE9EAD42C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA66BCA5-3934-449E-BAD3-D0DFBF4A04BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5030281C-CD4F-4106-A100-332A4C3C2AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D408134A-29E8-4D6A-9352-DB7F9CF55FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B08C41E-2357-44D5-A3A7-75389B343B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F40588-308A-4BA7-AE62-5DCC7D7528EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E41BD65A-F39B-42C5-8776-CE09345A531D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBAFBC02-38E9-41F3-8944-6F6AB0A85941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9069C99D-C935-4272-B7F4-172CFD246835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BE2EAA-CC60-4EFA-9E75-61EDA0EB69B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "71CABDC4-0E47-4E33-9075-79E0D59D9A92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A5893C-A855-4C49-A17A-83B6172C0496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048A2C7-9646-42E3-9D4B-DE9CF4AC66C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C915139-9B3A-4583-99A9-3447ACEF9E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE6A75-15F2-416C-9EBB-6FDD995C7399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D82630-555A-43CE-986D-2D15DD8A68F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9F1B32-B3C0-47AB-96C1-0AEF7A96744A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A23E72D9-9301-4CF8-A083-0AEC91F2845E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "983636D8-084A-40AA-8EEA-39D4D39EA056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAA6C1-D2F5-4C7A-AEEA-FEDD52F039B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCAC8831-637A-49B7-9DFD-93965D0944A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "247FF6EA-E8E8-4AC9-BC03-6D8929DC60EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "73AAA716-1DB3-4D38-A52B-F579EE5627AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "18257E82-134E-4B4B-9AA4-997582A6FE05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "C53AC67F-07A4-4DDF-9A21-AAC32E388454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E350D8C6-5618-4C7E-8D0D-D448B7B485EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "42224177-DEFC-4A23-9707-0C2A96902FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0017C6-C985-4F0C-89C4-198063DAB3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2A100A-4579-4E32-9ED1-54E6063032CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B41BB85-CED1-4CED-A56E-A58A22AAE4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "19437699-98F7-40EC-B0F9-502CA8126749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "3697FD64-0D39-45E0-B91E-6190B13CE8AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6449B24-7C8B-4035-8254-5EDFBE1C3ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B0AE8A-97A8-4105-B0E8-5CABBFD50587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.0:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "08036AF9-A0B1-4218-B341-121CDFC2B3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.1:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "C6FE4279-4773-4643-8D37-33685E2F4DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.2:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "D73C5AFC-5811-4EE8-8BB2-7D6A402739D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.3:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "DB696D61-C842-4EF3-A3E7-29DF8BB4D307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.4:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "2AEB9811-2739-451B-BEE9-8D91E2AE9437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.5:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "CC09C0F7-4FEF-4A56-8459-2D39F00E2D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jquery_update_project:jquery_update:7.x-2.6:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "F955EE40-A032-4080-A0FA-640ED09E717D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.0:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "2D58BBAA-9C3B-4AEA-AEB2-5CB1D734FBB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.0:beta1:*:*:*:drupal:*:*",
              "matchCriteriaId": "B4EE2425-F929-4E5E-BE3E-6E2353DDB081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.0:rc1:*:*:*:drupal:*:*",
              "matchCriteriaId": "F5197603-58AB-48C2-AB7B-0D125122F173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.1:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "CC4EE4AD-93AF-4C6C-8DCF-ABD7E0C2E657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.2:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "48BD4D9F-D693-4EA3-9983-2DF6D7C74944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.3:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "968EEC3D-5C16-46EF-BADB-42AA480CB2E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.4:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "B2AEF7D6-6D51-4255-9143-D13638854DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.5:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "F357CFDE-8FCE-4C09-BAC2-E413C0199887",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.6:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "674D78A9-90CD-4F7E-B109-93D3BD7AEE0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:labjs_project:labjs:7.x-1.7:*:*:*:*:drupal:*:*",
              "matchCriteriaId": "E943E30F-0053-49E7-923F-F13955E2AF89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redirecci\u00f3n abierta en el m\u00f3dulo Overlay en Drupal 7.x anterior a 7.41, el m\u00f3dulo jQuery Update 7.x-2.x anterior a 7.x-2.7 para Drupal, y el m\u00f3dulo LABjs 7.x-1.x anterior a 7.x-1.8 permite que atacantes remotos redirijan usuarios a sitios web arbitrarios y lleven a cabo ataques de phishing mediante vectores sin especificar. NOTA: Esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2015-3233."
    }
  ],
  "id": "CVE-2015-7943",
  "lastModified": "2024-11-21T02:37:42.713",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-10-18T18:29:00.330",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3897"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/77293"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2598426"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2598434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/77293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2598426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2598434"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}