From 2e370a20d851c18836a92d447b46abb33ca88270 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Fri, 16 Aug 2024 09:21:02 +0400 Subject: [PATCH] updated matcher --- http/cves/2024/CVE-2024-5936.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/http/cves/2024/CVE-2024-5936.yaml b/http/cves/2024/CVE-2024-5936.yaml index 71138a6124..ebcb3a37cc 100644 --- a/http/cves/2024/CVE-2024-5936.yaml +++ b/http/cves/2024/CVE-2024-5936.yaml @@ -1,34 +1,34 @@ id: CVE-2024-5936 info: - name: private-gpt < 0.5.0 - Open Redirect + name: PrivateGPT < 0.5.0 - Open Redirect author: ctflearner severity: medium description: | - An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. + An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. reference: - https://huntr.com/bounties/43f05c1e-d7b8-45e2-b1fe-48faf1e3a48d + - https://drive.google.com/file/d/1Fw5eT-9bAqsqzNUqdTXebtqIo5NI6T48/view - https://nvd.nist.gov/vuln/detail/CVE-2024-5936 - classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N cvss-score: 4.3 cve-id: CVE-2024-5936 cwe-id: CWE-601 - metadata: verified: true max-request: 1 + shodan-query: html:"private gpt" product: private-gpt - tags: cve2024,cve,huntr,private-gpt,redirect,openredirect + tags: cve2024,cve,private-gpt,redirect http: - method: GET path: - - "{{BaseURL}}/file=https://attacker.com" + - "{{BaseURL}}/file=https://oast.me" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$'