From 1f0275f4b85d7aa071fb62143ffb71c6580a3f5c Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Fri, 10 Mar 2023 13:38:43 -0500 Subject: [PATCH] Enhancement: headless/headless-open-redirect.yaml by cs --- headless/headless-open-redirect.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/headless/headless-open-redirect.yaml b/headless/headless-open-redirect.yaml index 05089e6d0f..c1d1593659 100644 --- a/headless/headless-open-redirect.yaml +++ b/headless/headless-open-redirect.yaml @@ -3,9 +3,13 @@ id: headless-open-redirect info: name: Open Redirect - Detect author: theamanrawat - severity: low + severity: medium description: | - Multiple open redirect vulnerabilities were detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + An open redirect was detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cwe-id: CWE-601 tags: redirect,generic,headless headless: @@ -119,4 +123,4 @@ headless: - "Evil.Com - We get it...Daily." condition: and -# Enhanced by md on 2023/03/08 +# Enhanced by cs on 2023/03/10