template name and ID update
parent
c951750bc7
commit
39e41ce464
|
@ -0,0 +1,23 @@
|
|||
id: CVE-2016-3978
|
||||
|
||||
info:
|
||||
name: FortiOS (Fortinet) - Open Redirect and XSS
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" parameter to "login."
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2016-3978
|
||||
- https://seclists.org/fulldisclosure/2016/Mar/68
|
||||
- http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability
|
||||
tags: cve,cve216,redirect,fortinet,fortios
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/login?redir=http://www.example.com'
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
|
|
@ -1,23 +0,0 @@
|
|||
id: fortios-open-redirect
|
||||
|
||||
info:
|
||||
name: FortiOS (Fortinet) - Open Redirect and XSS
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: The FortiOS webui accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
|
||||
reference:
|
||||
- https://seclists.org/fulldisclosure/2016/Mar/68
|
||||
- http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability
|
||||
tags: redirect,fortinet,fortios
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
||||
path:
|
||||
- '{{BaseURL}}/login?redir=http://www.example.com'
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
|
||||
part: header
|
Loading…
Reference in New Issue