FKIE_CVE-2012-5234

Vulnerability from fkie_nvd - Published: 2012-10-01 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Open redirect vulnerability in index.php in ocPortal before 7.1.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035AB70D-4E36-4E93-9D9C-7E5125061135",
              "versionEndIncluding": "7.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33E262D-A9F8-4DEC-B342-D1E05F43CC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0F25AC-E8BF-4D51-A03A-5B828A238EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0303909-3BC2-4EDF-99CC-7FFCB3553F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B50C76-A63F-44B5-8FEC-20A09286C8C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "418F0475-2A58-46C4-ABF9-CBDE61784293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B5CF5B-5159-4165-8DFE-BE813AD5BB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9388E-144E-47BF-A0D6-8E57398886D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A49321-D89B-4081-8A52-B62960952C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "218418AF-404F-439C-80DC-8CD4F970D3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7FA2EF-8669-461C-A31F-F50567530115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD05E0DA-9E4F-48B5-BB70-1E62C0CC6F3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9DE393D-9F84-4E17-BE66-7A57E5F28336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "98ECC9A9-A3EB-4A24-80BA-EAFD44EF2B90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "63C4CD14-B9B3-4336-9015-A3419B475622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E76DCF-147B-4E1B-A7AF-A85598050F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "022B5576-9125-4F68-9703-972EF8C093C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C71D27-DA94-40FD-94D7-FE00EB75F97B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A12BB7C-4B40-4A85-B8CA-56FA6B07EAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C748040D-9F25-4D11-8A4A-F8AEA184B47B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C93F6E7-8401-4A25-A79F-C46F9B12D0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9BC691BF-8E21-4772-8C80-1CF0E3F65204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D3340E35-75AE-42B9-AB36-1D667773B73A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1B0A267F-185A-41DB-AFF1-AEED4B23B76F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8785922E-AE60-4143-8E1C-3110F1035300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "09DA9DF7-1FB7-4ADD-A1B0-90DBCE506FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F47423-DCD0-4094-9E80-DDA914928CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7DFE2A-0538-4A3C-B47D-C848BFF2860A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69677C20-C350-4999-97EB-C19D240C7700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F63A9CDA-7AE4-4BA5-936A-9638C5B08913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8E968932-138D-42AA-8B5C-67F8E7A8613A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "99058B8A-EFF9-4F66-89C4-F50BAE21CE19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C19FCCA1-D4D9-487A-A200-2D2B06464012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B541D4-9D8A-404A-AFF4-5C2A20895697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2205664B-3698-4C5A-AFFF-7576DAA64EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5010BF58-C1A6-4E33-A316-D9131AE5C206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2D622F-FED9-4891-AFB7-D630462C0B06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22FCE9FB-C431-4DAB-BFCC-C229EDE641BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "EE7031C9-2DAF-4A31-B22D-53BF45BECA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF6B098-BEFC-4B86-B6CE-C091B05990D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:5.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6380D539-6266-4626-9079-FC5571D30000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED538256-BFAC-4CD6-99BB-4701BAA31481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "38A6F245-E6AB-4BEA-9974-419C0F7B467A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "220BE7CB-D80B-4E1A-92F1-2067368DBB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F464-0B92-4C82-A664-34AB12179287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6948726-5934-4BBD-A913-6E9B7F0D2994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "419792D9-620A-432F-9CFC-A7C19BA07E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C00C62-787F-4470-8F36-26C18F58C288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0BBCB42-CBF9-49B2-9634-CA7C8FA69379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D260A49-A274-4C95-B89C-BF7613CECF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A169D7E0-118E-45CD-8E03-F9835B585D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09418F06-9ECA-431B-9FDE-6550F1CED93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:6.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE40A6D7-A56F-47C8-9DD3-743998E35876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80C9D04-4221-4AD3-B6E5-B2B59B7CB35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3A4ADF-66F1-4B6D-9BF7-38D6BBF38ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F19B65E-3488-47B2-A21E-2F19F9DF7495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "77FBB8F9-8EC2-46AD-8A0A-FA665ED1F9AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65594010-CEBE-4655-B57F-AB0224D356E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE54653D-8DE4-4CDE-BD1C-280494859CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B21F925B-E195-4579-8707-9D0D89EC0B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ocportal:ocportal:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8375E1C2-FF7E-4993-AF42-9572B7EB5E17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in index.php in ocPortal before 7.1.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redirecci\u00f3n abierta en index.php en ocPortal antes de v7.1.6, permite a atacantes remotos redirigir a usuarios a sitios web de su elecci\u00f3n y llevar a cabo ataques de phishing a trav\u00e9s de una url en el par\u00e1metro redirect."
    }
  ],
  "id": "CVE-2012-5234",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-01T23:55:01.470",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ocportal.com/site/news/view/ocportal-security-update.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://ocportal.com/site/news/view/ocportal-security-update.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…