{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19357?format=json","vulnerability_id":"VCID-1ax1-6pzg-87f8","summary":"Drupal core Open Redirect vulnerability\nDrupal 7 has an Open Redirect vulnerability. For example, a user could be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL.\n\nThe vulnerability is caused by insufficient validation of the destination query parameter in the drupal_goto() function.\n\nOther versions of Drupal core are not vulnerable.","aliases":[{"alias":"GHSA-6gf6-24h2-66j4"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22042?format=json","purl":"pkg:composer/drupal/core@7.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ax1-6pzg-87f8"},{"vulnerability":"VCID-349d-w26k-mqfw"},{"vulnerability":"VCID-3fka-y25d-m7a3"},{"vulnerability":"VCID-3hf4-tvxn-zyh4"},{"vulnerability":"VCID-3s9f-prpy-hbcx"},{"vulnerability":"VCID-3sr6-86jw-6fb9"},{"vulnerability":"VCID-48ut-ykkc-83fx"},{"vulnerability":"VCID-53h1-sj47-gugn"},{"vulnerability":"VCID-5618-53yg-8qh4"},{"vulnerability":"VCID-565p-mgqe-gkfc"},{"vulnerability":"VCID-6ck5-9e5b-w3ay"},{"vulnerability":"VCID-6m8x-cfzp-tkf4"},{"vulnerability":"VCID-9ss3-mvt3-8bem"},{"vulnerability":"VCID-9wt5-xe6d-n3cb"},{"vulnerability":"VCID-bk92-66re-dkc5"},{"vulnerability":"VCID-brsq-e734-ffch"},{"vulnerability":"VCID-cucx-jfqf-pkd1"},{"vulnerability":"VCID-cvxp-ctj9-guej"},{"vulnerability":"VCID-djgn-ezxp-37eu"},{"vulnerability":"VCID-en3b-g3f3-a3e3"},{"vulnerability":"VCID-g1rp-twzp-63e1"},{"vulnerability":"VCID-ga35-289v-vqhr"},{"vulnerability":"VCID-gbz5-5frj-hber"},{"vulnerability":"VCID-gzcu-sbks-wyfa"},{"vulnerability":"VCID-jnu7-1j9c-dqck"},{"vulnerability":"VCID-k1gx-nznx-7qd6"},{"vulnerability":"VCID-kc7d-5k6x-77bp"},{"vulnerability":"VCID-kwe1-gm4m-tkgf"},{"vulnerability":"VCID-mhk6-9qdy-83f3"},{"vulnerability":"VCID-mt37-qzh7-gyfv"},{"vulnerability":"VCID-nd8n-5dsu-2fbp"},{"vulnerability":"VCID-rdgr-yuu7-xkey"},{"vulnerability":"VCID-rhj7-dy7q-jkhw"},{"vulnerability":"VCID-s8u8-xbdk-87dj"},{"vulnerability":"VCID-s9kv-9qfu-gbdq"},{"vulnerability":"VCID-ssyn-dxp9-3kdq"},{"vulnerability":"VCID-syrg-ckq7-cbd6"},{"vulnerability":"VCID-u5wt-ndvn-3ffg"},{"vulnerability":"VCID-v9v6-ae3e-g3hk"},{"vulnerability":"VCID-vura-3gnb-rybs"},{"vulnerability":"VCID-wabj-ty5p-pfd6"},{"vulnerability":"VCID-we42-mkyk-hfer"},{"vulnerability":"VCID-wwvq-399y-rfhc"},{"vulnerability":"VCID-wzgs-fr3u-cbdn"},{"vulnerability":"VCID-yare-57j9-j7cs"},{"vulnerability":"VCID-yrzt-3m97-53ce"},{"vulnerability":"VCID-zw3u-6ue7-efdf"},{"vulnerability":"VCID-zxqc-67jp-uba7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/drupal/core@7.0.0"}],"references":[{"reference_url":"https://github.com/drupal/core","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/drupal/core"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2020-05-20-1.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/2020-05-20-1.yaml"},{"reference_url":"https://www.drupal.org/sa-core-2020-003","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.drupal.org/sa-core-2020-003"},{"reference_url":"https://github.com/advisories/GHSA-6gf6-24h2-66j4","reference_id":"GHSA-6gf6-24h2-66j4","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6gf6-24h2-66j4"}],"weaknesses":[{"cwe_id":601,"name":"URL Redirection to Untrusted Site ('Open Redirect')","description":"A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ax1-6pzg-87f8"}