diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml new file mode 100644 index 0000000000..1e5f5efc3e --- /dev/null +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -0,0 +1,35 @@ +id: CVE-2014-9180 + +info: + name: Eleanor CMS - Open Redirect + author: Shankar Acharya + severity: medium + description: | + Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING. + remediation: | + Update to the latest version of Eleanor CMS to fix the open redirect vulnerability. + reference: + - https://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html + - https://nvd.nist.gov/vuln/detail/CVE-2014-9180 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/Au:N/C:N/I:P/A:N + cvss-score: 5.0 + cve-id: CVE-2014-9180 + cwe-id: CWE-601 + metadata: + verified: true + product: eleanor_cms + vendor: eleanor-cms + shodan-query: html:"eleanor" + tags: cve,cve2014,eleanor,cms,redirect + +http: + - method: GET + path: + - "{{BaseURL}}/go.php?http://interact.sh" + + matchers: + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'