CVE-2021-22873
moderate-risk
Published 2021-01-26
Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
Do I need to act?
!
46.2% chance of exploitation in next 30 days
EPSS score — higher than 54% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scr...
Broken Link
http://seclists.org/fulldisclosure/2021/Jan/60
Vendor Advisory
https://www.revive-adserver.com/security/revive-sa-2021-001/
Third Party Advisory
http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scr...
Broken Link
http://seclists.org/fulldisclosure/2021/Jan/60
Vendor Advisory
https://www.revive-adserver.com/security/revive-sa-2021-001/
45
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
17/34 · Moderate
Exposure
5/34 · Minimal