You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
382292 Open redirect
An attacker can mount a phishing attack by modifying the URL value to point to a malicious Web site.
In io.getlime.security.powerauth.app.webflow.controller.HomeController.continueToRedirect(javax.servlet.http.HttpServletRequest, javax.servlet.http.HttpServletResponse): User-controlled input is used to specify an address that is used as a URL redirect or forward. An attacker can create a link to the trusted site that redirects to a malicious Web site. This could enable the attacker to steal user credentials. (CWE-601)
382292 Open redirect
An attacker can mount a phishing attack by modifying the URL value to point to a malicious Web site.
In io.getlime.security.powerauth.app.webflow.controller.HomeController.continueToRedirect(javax.servlet.http.HttpServletRequest, javax.servlet.http.HttpServletResponse): User-controlled input is used to specify an address that is used as a URL redirect or forward. An attacker can create a link to the trusted site that redirects to a malicious Web site. This could enable the attacker to steal user credentials. (CWE-601)
https://scan4.scan.coverity.com/reports.htm#v57086/p16071/fileInstanceId=125567704&defectInstanceId=14538873&mergedDefectId=382292&eventId=14538873-4
The text was updated successfully, but these errors were encountered: