pivotalsoftware concourse CVE-2020-5409 is a vulnerability in Pivotal Software Concourse
Published on May 14, 2020

Concourse Open Redirect in the /sky/login endpoint
Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow. A remote unauthenticated attacker could convince a user to click on a link using the OAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. (This issue is similar to, but distinct from, CVE-2018-15798.)

NVD

Weakness Type

What is an Open Redirect Vulnerability?

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.

CVE-2020-5409 has been classified to as an Open Redirect vulnerability or weakness.


Products Associated with CVE-2020-5409

Want to know whenever a new CVE is published for Pivotal Software Concourse? stack.watch will email you.

 

Affected Versions

Pivotal Concourse:

Exploit Probability

EPSS
0.67%
Percentile
70.91%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.