Athenz vulnerable to open redirect


Athenz provided by Verizon Media contains an open redirect vulnerability (CWE-601).

Akaki Tsunoda reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.7 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Changed
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

Verizon Media
  • Athenz v1.8.24 and earlier


When accessing a specially crafted URL, the user may be redirected to an arbitrary website. As a result, the user may become a victim of a phishing attack.

[Update the Software]
Update the software to the latest version according to the information provided by the developer.
This vulnerability was addressed in Athenz v1.8.25.
Vendor Information

Verizon Media
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2019-6035

  1. JVN : JVN#57070811
  2. National Vulnerability Database (NVD) : CVE-2019-6035
Revision History

  • [2019/12/12]
      Web page was published
  • [2019/12/26]
      CVE : CVE-ID was added