CVE-2020-8143

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-8143
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8143.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-8143
Published
2020-04-03T21:15:12Z
Modified
2025-10-15T12:22:00.138137Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An Open Redirect vulnerability was discovered in Revive Adserver version < 5.0.5 and reported by HackerOne user hoangn144. A remote attacker could trick logged-in users to open a specifically crafted link and have them redirected to any destination.The CSRF protection of the “/www/admin/*-modify.php” could be skipped if no meaningful parameter was sent. No action was performed, but the user was still redirected to the target page, specified via the “returnurl” GET parameter.

References

Affected packages

Git / github.com/revive-adserver/revive-adserver

Affected ranges

Type
GIT
Repo
https://github.com/revive-adserver/revive-adserver
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.5
v3.0.6
v3.1.0
v3.1.0-beta
v3.2.0
v3.2.0-beta
v3.2.1
v3.2.1-rc1
v3.2.3

v4.*

v4.0.0
v4.0.0-rc1
v4.0.1
v4.0.2
v4.1.0
v4.1.0-rc1
v4.1.2
v4.1.3
v4.1.4
v4.2.0
v4.2.0-rc1
v4.2.1

v5.*

v5.0.0
v5.0.0-rc1
v5.0.1
v5.0.3
v5.0.4