nuclei-templates/http/cves/2009/CVE-2009-0347.yaml

41 lines
1.4 KiB
YAML
Raw Normal View History

2023-06-14 15:57:46 +00:00
id: CVE-2009-0347
info:
2023-06-15 16:57:20 +00:00
name: Autonomy Ultraseek - Open Redirect
2023-06-14 15:57:46 +00:00
author: ctflearner
severity: medium
description: |
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
2023-09-06 13:22:34 +00:00
remediation: |
Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
2023-06-14 15:57:46 +00:00
reference:
2023-06-14 16:17:34 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2009-0347
- https://www.exploit-db.com/exploits/32766
- https://www.kb.cert.org/vuls/id/202753
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48336
2023-07-11 19:49:27 +00:00
- http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html
2023-06-14 15:57:46 +00:00
classification:
2023-07-11 19:49:27 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
2023-06-14 15:57:46 +00:00
cvss-score: 5.8
cve-id: CVE-2009-0347
cwe-id: CWE-59
2023-08-31 11:46:18 +00:00
epss-score: 0.09851
epss-percentile: 0.94077
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: autonomy
product: ultraseek
2023-06-15 16:57:20 +00:00
tags: cve,cve2009,redirect,autonomy
2023-06-14 15:57:46 +00:00
http:
- method: GET
path:
2023-06-15 16:57:20 +00:00
- "{{BaseURL}}/cs.html?url=http://www.interact.sh"
2023-06-14 15:57:46 +00:00
matchers:
- type: regex
part: header
regex:
2023-06-15 16:57:20 +00:00
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'