{"id":"CVE-2019-5433","details":"A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.","modified":"2026-04-10T04:19:28.282223Z","published":"2019-05-06T17:29:00.620Z","references":[{"type":"FIX","url":"https://www.revive-adserver.com/security/revive-sa-2019-001/"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/390663"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/revive-adserver/revive-adserver","events":[{"introduced":"0"},{"fixed":"ed2ee13b2046cf2639417fa2d98687fee43e916e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.2.0"}]}}],"versions":["v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v3.1.0-beta","v3.2.0","v3.2.0-beta","v3.2.1","v3.2.1-rc1","v4.0.0","v4.0.0-rc1","v4.0.1","v4.0.2","v4.1.0","v4.1.0-rc1","v4.1.2","v4.1.3","v4.1.4","v4.2.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-5433.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}]}