From 278ae78af02cb01b5d17965df5fd39dff5f48373 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 6 Sep 2021 17:58:24 +0900 Subject: [PATCH] Create CVE-2019-7275.yaml --- CVE-2019-7275.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 CVE-2019-7275.yaml diff --git a/CVE-2019-7275.yaml b/CVE-2019-7275.yaml new file mode 100644 index 0000000000..a3e1a53202 --- /dev/null +++ b/CVE-2019-7275.yaml @@ -0,0 +1,19 @@ +id: CVE-2019-7275 + +info: + name: Open Redirect in Optergy Proton/Enterprise BMS + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2019110074 + severity: low + tags: cves,optergy,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/updating.jsp?url=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header