2023-06-14 16:49:48 +00:00
id : CVE-2004-1965
2023-06-14 17:26:36 +00:00
2023-06-14 16:49:48 +00:00
info :
name : Open Bulletin Board (OpenBB) v1.0.6 - Open Redirect/XSS
author : ctflearner
severity : medium
description : |
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
reference :
- https://www.exploit-db.com/exploits/24055
- https://nvd.nist.gov/vuln/detail/CVE-2004-1965
2023-07-11 19:49:27 +00:00
- http://marc.info/?l=bugtraq&m=108301983206107&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15966
2023-06-14 16:49:48 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
2023-06-14 16:49:48 +00:00
cvss-score : 4.3
cve-id : CVE-2004-1965
cwe-id : NVD-CWE-Other
2023-07-11 19:49:27 +00:00
epss-score : 0.0113
2023-06-14 16:49:48 +00:00
cpe : cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
2023-08-31 11:46:18 +00:00
epss-percentile : 0.82864
2023-06-14 16:49:48 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : openbb
product : openbb
2023-06-14 17:26:36 +00:00
tags : cve,cve2004,redirect,xss,openbb
2023-06-14 16:49:48 +00:00
http :
- method : GET
path :
2023-06-15 16:52:02 +00:00
- "{{BaseURL}}/index.php?redirect=http%3A%2F%2Fwww.interact.sh"
2023-06-14 16:49:48 +00:00
matchers :
- type : regex
part : header
regex :
2023-06-15 16:52:02 +00:00
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'