Multiple open redirect vulnerabilities in AIST NetCat 3.12 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the redirect parameter in a logoff action to modules/auth/index.php or (2) the url parameter to modules/linkmanager/redirect.php. NOTE: this was reported within an HTTP Response Splitting section in the original disclosure.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Netcat | Netcat | * | 3.12 (including) |
Netcat | Netcat | 1.1 (including) | 1.1 (including) |
Netcat | Netcat | 2.0 (including) | 2.0 (including) |
Netcat | Netcat | 2.1 (including) | 2.1 (including) |
Netcat | Netcat | 2.2 (including) | 2.2 (including) |
Netcat | Netcat | 2.3 (including) | 2.3 (including) |
Netcat | Netcat | 2.4 (including) | 2.4 (including) |
Netcat | Netcat | 3.0 (including) | 3.0 (including) |