diff --git a/headless/headless-open-redirect.yaml b/headless/headless-open-redirect.yaml index 05089e6d0f..c1d1593659 100644 --- a/headless/headless-open-redirect.yaml +++ b/headless/headless-open-redirect.yaml @@ -3,9 +3,13 @@ id: headless-open-redirect info: name: Open Redirect - Detect author: theamanrawat - severity: low + severity: medium description: | - Multiple open redirect vulnerabilities were detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + An open redirect was detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cwe-id: CWE-601 tags: redirect,generic,headless headless: @@ -119,4 +123,4 @@ headless: - "Evil.Com - We get it...Daily." condition: and -# Enhanced by md on 2023/03/08 +# Enhanced by cs on 2023/03/10