An issue exists in Open-AudIT Professional 2.1. It is possible to inject a malicious payload in the redirect_url parameter to the /login URI to trigger an open redirect. A "data:text/html;base64," payload can be used with JavaScript code.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
open-audit open-audit 2.1 |