29 lines
648 B
YAML
29 lines
648 B
YAML
|
id: openvpn-hhi
|
||
|
|
||
|
info:
|
||
|
name: OpenVPN Host Header Injection
|
||
|
author: twitter.com/Dheerajmadhukar
|
||
|
severity: info
|
||
|
description: A vulnerability in OpenVPN Access Server allows remote attackers to inject arbitrary redirection URLs by using the 'Host' HTTP header field.
|
||
|
tags: openvpn,hostheader-injection
|
||
|
|
||
|
http:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET / HTTP/1.1
|
||
|
Host: {{randstr}}.tld
|
||
|
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
|
||
|
- type: word
|
||
|
words:
|
||
|
- "https://{{randstr}}.tld/__session_start__/"
|
||
|
- "openvpn_sess"
|
||
|
part: header
|
||
|
condition: and
|
||
|
|
||
|
- type: status
|
||
|
status:
|
||
|
- 302
|