ID CVE-2014-9617
Summary Open redirect vulnerability in remotereporter/load_logfiles.php in Netsweeper before 4.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.1:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.2:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.4:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.4:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.5:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.5:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.6:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.6:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.7:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.7:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.8:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.8:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.9:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.9:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.10:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.10:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.11:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.11:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.12:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.12:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.13:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.13:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.14:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.14:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.15:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.15:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:2.6.29.16:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:2.6.29.16:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:3.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:3.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 20-02-2020 - 17:09)
Impact:
Exploitability:
CWE CWE-601
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
refmap via4
misc http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html
Last major update 20-02-2020 - 17:09
Published 19-02-2020 - 21:15
Last modified 20-02-2020 - 17:09
Back to Top