Automated Logic's WebCtrl Server Version 6.1 'Help' index pages are vulnerable to open redirection. The vulnerability allows an attacker to send a maliciously crafted URL which could result in redirecting the user to a malicious webpage or downloading a malicious file.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24369 Automated Logic's WebCtrl Server Version 6.1 'Help' index pages are vulnerable to open redirection. The vulnerability allows an attacker to send a maliciously crafted URL which could result in redirecting the user to a malicious webpage or downloading a malicious file.
Fixes

Solution

Upgrade to the latest supported version of WebCtrl 7.0 “October 29, 2020 - cumulative patch” or later.


Workaround

As a manual work around an administrator can add the CSP header/meta tag to each “index.htm” file in each of the directories under “<install_dir>/webroot/_common/lvl5/help/*”. These are the main index files for each help for each program/tool and are all web accessible. Example would read: <meta http-equiv="Content-Security-Policy" content="default-src 'self'; img-src 'self' data:; font-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'">

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:29:16.024Z

Reserved: 2022-03-17T00:00:00.000Z

Link: CVE-2022-1019

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-19T21:15:13.747

Modified: 2024-11-21T06:39:52.233

Link: CVE-2022-1019

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.