From 0ba6e7ac6c298cc5cd7136492d14312ed34debe2 Mon Sep 17 00:00:00 2001 From: ctflearner <98345027+ctflearner@users.noreply.github.com> Date: Thu, 15 Jun 2023 13:01:32 +0530 Subject: [PATCH] Create CVE-2022-0869.yaml Added a New Nuclei Template as CVE-2022-0869 --- http/cves/2022/CVE-2022-0869.yaml | 35 +++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 http/cves/2022/CVE-2022-0869.yaml diff --git a/http/cves/2022/CVE-2022-0869.yaml b/http/cves/2022/CVE-2022-0869.yaml new file mode 100644 index 0000000000..2fe8beaef5 --- /dev/null +++ b/http/cves/2022/CVE-2022-0869.yaml @@ -0,0 +1,35 @@ +id: CVE-2022-0869 +info: + name: nitely/spirit prior to 0.12.3.- Open Redirect + author: ctflearner + severity: medium + description: | + Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-0869 + - https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342/ + + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-0869 + cwe-id: CWE-601 + cpe: cpe:2.3:a:spirit-project:spirit:*:*:*:*:*:*:*:* + metadata: + max-request: 4 + tags: cve,cve2022,redirect,nitely/spirit + +http: + - method: GET + path: + - "{{BaseURL}}/user/login/?next=http%3A%2F%2Fwww.evil.com" + - "{{BaseURL}}/user/logout?next=http%3A%2F%2Fwww.evil.com" + - "{{BaseURL}}/user/register?next=http%3A%2F%2Fwww.evil.com" + - "{{BaseURL}}/user/resend-activation?next=http%3A%2F%2Fwww.evil.com" + + + matchers: + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)evil\.com\/?(\/|[^.].*)?$'