### [CVE-2016-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6020) ![](https://img.shields.io/static/v1?label=Product&message=Sterling%20B2B%20Integrator&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=-%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.4.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Gain%20Access&color=brightgreen) ### Description IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. ### POC #### Reference - http://www.securityfocus.com/bid/95098 #### Github No PoCs found on GitHub currently.