nuclei-templates/cves/2020/CVE-2020-15129.yaml

33 lines
1.0 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-15129
2020-09-14 17:31:40 +00:00
info:
name: Open-redirect in Traefik
author: dwisiswant0
severity: medium
description: There exists a potential open redirect vulnerability in Traefik's handling of the X-Forwarded-Prefix header. Active Exploitation of this issue is unlikely as it would require active header injection,
however the Traefik team may want to address this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
reference:
- https://securitylab.github.com/advisories/GHSL-2020-140-Containous-Traefik
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 4.7
cve-id: CVE-2020-15129
cwe-id: CWE-601
tags: cve,cve2020,traefik,redirect
2020-09-14 17:40:03 +00:00
2020-09-14 17:31:40 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}"
headers:
X-Forwarded-Prefix: "https://foo.nl"
matchers-condition: and
matchers:
- type: status
status:
2020-09-14 17:39:24 +00:00
- 302
2020-09-14 17:31:40 +00:00
- type: word
words:
- "<a href=\"https://foo.nl/dashboard/\">Found</a>"
condition: or
part: body