### [CVE-2018-8937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8937) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in Open-AudIT Professional 2.1. It is possible to inject a malicious payload in the redirect_url parameter to the /login URI to trigger an open redirect. A "data:text/html;base64," payload can be used with JavaScript code. ### POC #### Reference - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html - https://nileshsapariya.blogspot.ae/2018/03/open-redirect-to-reflected-xss-open.html #### Github No PoCs found on GitHub currently.