cve-2016-3167
Vulnerability from cvelistv5
Published
2016-04-12 15:00
Modified
2024-08-05 23:47
Severity ?
Summary
Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the "destination" parameter.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:47:58.013Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/02/24/19"
          },
          {
            "name": "[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/03/15/10"
          },
          {
            "name": "DSA-3498",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3498"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/SA-CORE-2016-001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the \"destination\" parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-12T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/02/24/19"
        },
        {
          "name": "[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/03/15/10"
        },
        {
          "name": "DSA-3498",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3498"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/SA-CORE-2016-001"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-3167",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the \"destination\" parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/02/24/19"
            },
            {
              "name": "[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/03/15/10"
            },
            {
              "name": "DSA-3498",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3498"
            },
            {
              "name": "https://www.drupal.org/SA-CORE-2016-001",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/SA-CORE-2016-001"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-3167",
    "datePublished": "2016-04-12T15:00:00",
    "dateReserved": "2016-03-15T00:00:00",
    "dateUpdated": "2024-08-05T23:47:58.013Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-3167\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-04-12T15:59:04.980\",\"lastModified\":\"2016-04-19T03:20:35.693\",\"vulnStatus\":\"Analyzed\",\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/601.html\\\"\u003eCWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\u003c/a\u003e\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the \\\"destination\\\" parameter.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de redirecci\u00f3n abierta en la funci\u00f3n drupal_goto en Drupal 6.x en versiones anteriores a 6.38, cuando se utiliza con PHP en versiones anteriores a 5.4.7, permite a atacantes remotos redirigir a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a trav\u00e9s de una URL con codificado doble en el par\u00e1metro \\\"destination\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.4.6\",\"matchCriteriaId\":\"C5BE645F-5E89-4512-8A5C-D580BFE65D10\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCBC7BB8-2B50-476D-BD96-C968F105CE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"550778E2-BEE5-403D-8744-0B18C5D3AFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B9F954-3A10-4378-A842-4061E97056DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD3F6D1-2530-4B4C-86BE-DFDB886BF6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF535DF-2338-4BF8-A9AC-3B6C60C4D591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"58876D53-BCE4-459E-AC75-37E4E46621CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"937F4629-2AA1-4954-BF72-8E9CAF1B67FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6410BD0A-1B47-4EC2-8D2A-161ADBB09699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D8F291-CBEB-4EAA-9388-F63066A2DFA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D76BC5-0409-4D78-8064-A78B923E9167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB73B2E1-2554-4CA2-9C82-B694509CE43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A7827ED-D8AF-42B3-B514-39A04EB0879A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F491DE31-8DBB-4F4E-8798-F82DC855D08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADEA9E5-10EB-4AB4-BD90-1F64A15708AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D0A167-BE47-4E4E-8467-0AD2F38A3431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7CBB558-D5A3-4D68-9C62-D1D521BCFEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D25FA1-2F31-40DB-AD54-DB233E060B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F91E944-26C4-4886-B9B9-F32BD15569BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DF00E9-3952-4D1C-8ED5-3270BD9697F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B779FA7-E371-4111-95B7-301C804DC0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B89B2E01-DFC7-4672-85E7-3930EE653806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39169C30-5F4D-4333-B0B9-0881811F1E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9703D3D-C2D3-4EA0-A67E-CC17B0146B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEDA1EF-D7DB-47B5-BF6C-A9ED84427030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFE9DB8-972F-4BE2-9087-ED38ACFAA822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F27EC1-48AF-402C-A1A6-0B66E693ABD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54143AC5-9F03-4BD7-8FFE-A6DAE1634504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE98FD40-92FB-4417-85EB-FBACA56ED5BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D7A256-8631-4AD2-8B56-89FFE46A3892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7DC189-520E-4EB4-BBEC-4EF0D13E0BAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11641CDE-16A3-49BF-BF2F-AC6C01DED11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3E83BA-AA3B-4FE7-B023-DC6EAA9E18F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E51C4AA-C0D2-4D13-8EE6-8DB99FB37C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E26331F-58DD-4338-8C6B-B389107574F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A71C1B0-4ADF-4160-8C4B-88D42382046C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E48D8F72-DEDD-4D40-8B97-8B59AF1E089F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D4AAB4-ED93-44F7-AA4E-0E18C6BFBD32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AD25C6-7F0D-42CC-856A-04F8D3AF30BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C886384D-F7E7-48FF-A7AF-1DE6A0A4098D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFEAF9B-29B5-45C1-982F-BF207C7C4C86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC23FB5-BCBC-4961-AFAC-2A038A8CCA84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9FAB92-2E65-45CF-8ABD-4908319FF071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D3AF1B-C00A-4BDD-8D7A-E711B7FB3FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:6.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86010353-5828-4715-9524-7FD631E58D05\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2016/dsa-3498\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/02/24/19\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/03/15/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.drupal.org/SA-CORE-2016-001\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.