The web application sends a redirect to another location, but instead of exiting, it executes additional code.
cwe_Nature: ChildOf cwe_CWE_ID: 705 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 670 cwe_View_ID: 1000
|['Other', 'Confidentiality', 'Integrity', 'Availability']||['Alter Execution Logic', 'Execute Unauthorized Code or Commands']||This weakness could affect the control flow of the application and allow execution of untrusted code.|
This code queries a server and displays its status when a request comes from an authorized IP address.
This code redirects unauthorized users, but continues to execute code after calling http_redirect(). This means even unauthorized users may be able to access the contents of the page or perform a DoS attack on the server being queried. Also, note that this code is vulnerable to an IP address spoofing attack (CWE-212).
|CVE-2013-1402||Execution-after-redirect allows access to application configuration details.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1402|
|CVE-2009-1936||chain: library file sends a redirect if it is directly requested but continues to execute, allowing remote file inclusion and path traversal.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1936|
|CVE-2007-2713||Remote attackers can obtain access to administrator functionality through EAR.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2713|
|CVE-2007-4932||Remote attackers can obtain access to administrator functionality through EAR.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4932|
|CVE-2007-5578||Bypass of authentication step through EAR.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5578|
|CVE-2007-2713||Chain: Execution after redirect triggers eval injection.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2713|
|CVE-2007-6652||chain: execution after redirect allows non-administrator to perform static code injection.||https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6652|