diff --git a/cves/2022/CVE-2022-28923.yaml b/cves/2022/CVE-2022-28923.yaml new file mode 100644 index 0000000000..28e1e86bca --- /dev/null +++ b/cves/2022/CVE-2022-28923.yaml @@ -0,0 +1,45 @@ +id: CVE-2022-28923 +info: + name: Caddy Open Redirect [CVE-2022-28923] + author: Sascha Brendel | Lednerb IT-Security GmbH | lednerb.de + severity: medium + description: | + Caddy version 2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-28923 + cwe-id: CWE-601 + reference: + - https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/ + - https://www.cve.org/CVERecord?id=CVE-2022-28923 + tags: cve,cve2022,redirect,caddy,webserver + +requests: + - method: GET + path: + - "{{BaseURL}}/%5C%5Cexample.org/%252e%252e%252f" + redirects: false + max-redirects: 3 + matchers-condition: and + matchers: + # Match permanent redirect + - type: status + status: + - 308 + + # Only match caddy-Server + - type: word + words: + - "Server: Caddy" + - "Server: caddy" + condition: or + part: header + + # Do not match redirects to / + - type: word + part: body + negative: true + words: + - '' + \ No newline at end of file