CVE-2020-5409 is a vulnerability in Pivotal Software Concourse
Published on May 14, 2020
Concourse Open Redirect in the /sky/login endpoint
Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow. A remote unauthenticated attacker could convince a user to click on a link using the OAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. (This issue is similar to, but distinct from, CVE-2018-15798.)
Weakness Type
What is an Open Redirect Vulnerability?
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
CVE-2020-5409 has been classified to as an Open Redirect vulnerability or weakness.
Products Associated with CVE-2020-5409
Want to know whenever a new CVE is published for Pivotal Software Concourse? stack.watch will email you.
Affected Versions
Pivotal Concourse:- Version unspecified and below 5.2.8 is affected.
- Version unspecified and below 5.5.10 is affected.
- Version unspecified and below 5.8.1 is affected.
- Version unspecified and below 6.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.