diff --git a/http/cves/2022/CVE-2022-0087.yaml b/http/cves/2022/CVE-2022-0087.yaml new file mode 100644 index 0000000000..2ae703c5eb --- /dev/null +++ b/http/cves/2022/CVE-2022-0087.yaml @@ -0,0 +1,33 @@ +id: CVE-2022-0087 + +info: + name: Open Redirect and Reflected XSS on Keystone 6 Login Page + author: Shivansh Khari + severity: medium + description: On the login page, there is a "from=" parameter in URL which is vulnerable to open redirect and can be escalated to reflected XSS. + remediation: Please upgrade to @keystone-6/auth >= 1.0.2, where this vulnerability has been closed. If you are using @keystone-next/auth, we strongly recommend you upgrade to @keystone-6 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-0087 + - https://huntr.com/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e + metadata: + vendor: keystonejs + product: keystone + framework: node.js + +http: + - method: GET + path: + - "{{BaseURL}}/signin?from=http://evil.com" + - "{{BaseURL}}/signin?from=javascript:alert(document.cookie)" + + matchers-condition: or + matchers: + - type: word + part: header + words: + - "Location: http://evil.com" + + - type: word + part: body + words: + - ""