<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTP Open Redirect in Parameter &amp;quot;failure&amp;quot; After Login (CVE-2019-14223) in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/http-open-redirect-in-parameter-quot-failure-quot-after-login/m-p/144487#M38351</link>
    <description>&lt;P&gt;Since 5.2 is not a supported version any more, please upgrade to version 6.2 or later.&lt;/P&gt;
&lt;P&gt;Additional details on this vulnerability are available in &lt;A href="https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community" target="_blank" rel="nofollow noopener noreferrer"&gt;https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2023 07:53:33 GMT</pubDate>
    <dc:creator>angelborroy</dc:creator>
    <dc:date>2023-03-27T07:53:33Z</dc:date>
    <item>
      <title>HTTP Open Redirect in Parameter "failure" After Login (CVE-2019-14223)</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/http-open-redirect-in-parameter-quot-failure-quot-after-login/m-p/144486#M38350</link>
      <description>&lt;P&gt;An open redirect vulnerability occurs when an application allows a user to control a redirect or forward to another URL. If the app does not validate untrusted user input, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker’s phishing site.&lt;/P&gt;&lt;P&gt;Penetration tester found that Alfresco CMS affected by CVE-2019-14223. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website.&lt;/P&gt;&lt;P&gt;With this vulnerability, attacker may able to redirect victim to external malicious site. In more sophisticated attacks, attacker also able to set up phishing pages or hosted malicious javascript to be executed on victim browser on the site.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 03:12:50 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/http-open-redirect-in-parameter-quot-failure-quot-after-login/m-p/144486#M38350</guid>
      <dc:creator>leochan168</dc:creator>
      <dc:date>2023-03-27T03:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP Open Redirect in Parameter "failure" After Login (CVE-2019-14223)</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/http-open-redirect-in-parameter-quot-failure-quot-after-login/m-p/144487#M38351</link>
      <description>&lt;P&gt;Since 5.2 is not a supported version any more, please upgrade to version 6.2 or later.&lt;/P&gt;
&lt;P&gt;Additional details on this vulnerability are available in &lt;A href="https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community" target="_blank" rel="nofollow noopener noreferrer"&gt;https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 07:53:33 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/http-open-redirect-in-parameter-quot-failure-quot-after-login/m-p/144487#M38351</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-03-27T07:53:33Z</dc:date>
    </item>
  </channel>
</rss>

