No analysis available yet.
Vendor Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-1594 | Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter. |
Thu, 02 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open redirect vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url_bounce parameter. | A flaw was found in Spacewalk, as used in Red Hat Network Satellite. This open redirect vulnerability allows remote attackers to redirect users to arbitrary web sites by manipulating a URL in the url_bounce parameter. This can enable attackers to conduct phishing attacks, potentially leading to unauthorized information disclosure or credential theft. |
| Title | Spacewalk: login page open redirect via url_bounce | Spacewalk: spacewalk: open redirect vulnerability enables phishing attacks via url parameter |
| First Time appeared |
Redhat enterprise Linux
|
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 |
|
| Vendors & Products |
Redhat enterprise Linux
|
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-02T21:17:14.782Z
Reserved: 2011-04-05T00:00:00.000Z
Link: CVE-2011-1594
No data.
Status : Deferred
Published: 2014-02-05T18:55:04.817
Modified: 2026-04-02T22:16:22.943
Link: CVE-2011-1594
OpenCVE Enrichment
No data.
EUVD