An attacker could craft a specific URL which specifies a third party website. This redirection could also include specific commands to be sent to the third party website which would appear to have come from the user. Successful exploitation of this vulnerability would require specific knowledge of the targetted user and be difficult to exploit on a widespread scale.
An attacker could craft a specific URL which specifies a third party website. This redirection could also include specific commands to be sent to the third party website which would appear to have come from the user. Successful exploitation of this vulnerability would require specific knowledge of the targetted user and be difficult to exploit on a widespread scale.