nuclei-templates/http/cves/2024/CVE-2024-0337.yaml

24 lines
877 B
YAML
Raw Normal View History

2024-04-10 21:29:59 +00:00
id: CVE-2024-0337
info:
name: Travelpayouts <= 1.1.16 - Open Redirect
author: Kazgangap
severity: medium
description: |
The plugin is vulnerable to Open Redirect due to insufficient validation on the travelpayouts_redirect variable. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
reference:
- https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/
classification:
epss-score: 0.00043
epss-percentile: 0.07895
tags: wpscan,cve2024,wordpress,redirect
http:
- method: GET
path:
- "{{BaseURL}}/?travelpayouts_redirect=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'