diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml new file mode 100644 index 0000000000..98cd0f66a4 --- /dev/null +++ b/cves/2021/CVE-2021-41826.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-41826 + +info: + name: PlaceOS 1.2109.1 - Open Redirection + author: geeknik + severity: low + description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect + reference: + - https://github.com/PlaceOS/auth/issues/36 + - https://www.exploit-db.com/exploits/50359 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41826 + tags: cve,cve2021,placeos,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/logout?continue=//example.com" + + matchers-condition: and + matchers: + + - type: status + status: + - 302 + - 301 + condition: or + + - type: regex + part: header + words: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'