Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-49281
HistoryDec 01, 2023 - 10:10 p.m.

CVE-2023-49281 Open Redirect in Login Function of Calendarinho

2023-12-0122:10:05
CWE-601
GitHub_M
www.cve.org
2
cve-2023-49281
open redirect
calendarinho
login function
web application
phishing attacks
information theft
reputation damage
patched vulnerability
commit 15b2393
update required

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

EPSS

0.001

Percentile

20.4%

Calendarinho is an open source calendaring application to manage large teams of consultants. An Open Redirect issue occurs when a web application redirects users to external URLs without proper validation. This can lead to phishing attacks, where users are tricked into visiting malicious sites, potentially leading to information theft and reputational damage to the website used for redirection. The problem is has been patched in commit 15b2393. Users are advised to update to a commit after 15b2393. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "Cainor",
    "product": "Calendarinho",
    "versions": [
      {
        "version": "< 15b2393",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

EPSS

0.001

Percentile

20.4%

Related for CVELIST:CVE-2023-49281