nuclei-templates/vulnerabilities/wordpress/eatery-restaurant-open-redi...

23 lines
702 B
YAML
Raw Normal View History

id: eatery-restaurant-open-redirect
info:
name: WordPress Eatery Restaurant Themes < 2.2 - Open Redirection
author: 0x_Akoko
severity: low
description: |
WordPress Eatery Restaurant Themes 2.2 accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect
reference:
- https://cxsecurity.com/issue/WLB-2020030183
tags: wordpress,wp-theme,redirect,wp
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/themes/eatery/nav.php?-Menu-=https://interact.sh/"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'