From 201220c2f4ce9fe5f8d6eb8bfd799d2b3ea9b1ea Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 12 Jul 2021 18:48:37 +0900 Subject: [PATCH] Create kentico-open-redirect.yaml --- kentico-open-redirect.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 kentico-open-redirect.yaml diff --git a/kentico-open-redirect.yaml b/kentico-open-redirect.yaml new file mode 100644 index 0000000000..c4c9decbc0 --- /dev/null +++ b/kentico-open-redirect.yaml @@ -0,0 +1,20 @@ +id: kentico-open-redirect + +info: + name: Web application Kentico CMS 8.2 Open Redirection + author: 0x_Akoko + description: The GetDocLink.ashx with link variable is vulnerable to open redirect vulnerability + reference: https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html + severity: low + tags: kentico,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header