2022-09-23 07:01:29 +00:00
id : CVE-2016-10368
info :
2022-10-19 21:11:27 +00:00
name : Opsview Monitor Pro - Open Redirect
2022-09-23 07:01:29 +00:00
author : 0x_Akoko
2022-09-23 08:39:48 +00:00
severity : medium
2022-09-23 07:01:29 +00:00
description : |
2022-10-19 21:11:27 +00:00
Opsview Monitor Pro before 5.1.0.162300841, before 5.0.2.27475, before 4.6.4.162391051, and 4.5.x without a certain 2016 security patch contains an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the login URI.
2022-09-23 07:01:29 +00:00
reference :
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18774
2022-09-23 08:39:48 +00:00
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341
2022-10-19 21:11:27 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2016-10368
2022-09-23 07:01:29 +00:00
classification :
2022-09-23 08:39:48 +00:00
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-09-23 07:01:29 +00:00
cvss-score : 6.1
cve-id : CVE-2016-10368
cwe-id : CWE-601
tags : cve,cve2016,redirect,opsview,authenticated
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2022-09-23 07:01:29 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-09-23 07:01:29 +00:00
- raw :
- |
POST /login HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
login_username={{username}}&login_password={{password}}&login=&back=//www.interact.sh&app=OPSVIEW
matchers-condition : and
matchers :
- type : regex
part : header
regex :
2023-03-01 18:22:21 +00:00
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
2022-09-23 07:01:29 +00:00
- type : status
status :
- 302
2022-10-19 21:11:27 +00:00
# Enhanced by mp on 2022/10/12