From 4c68458f32ef971e3a348dc6b94d55f0e2bc320a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 7 Oct 2024 02:59:20 +0530 Subject: [PATCH] Create CVE-2024-8021.yaml --- http/cves/2024/CVE-2024-8021.yaml | 40 +++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 http/cves/2024/CVE-2024-8021.yaml diff --git a/http/cves/2024/CVE-2024-8021.yaml b/http/cves/2024/CVE-2024-8021.yaml new file mode 100644 index 0000000000..adc725b414 --- /dev/null +++ b/http/cves/2024/CVE-2024-8021.yaml @@ -0,0 +1,40 @@ +id: CVE-2024-8021 + +info: + name: Gradio - Open Redirect Bypass via URL encoding + author: DhiyaneshDK + severity: medium + description: | + Gradio allows an open redirect bypass via URL encoding, enabling attackers to redirect users to malicious sites. This can lead to phishing attacks and loss of trust in the application. + reference: + - https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888 + metadata: + verified: true + max-request: 1 + vendor: gradio_project + product: gradio + shodan-query: + - http.html:"__gradio_mode__" + - http.title:"gradio" + fofa-query: + - body="__gradio_mode__" + - title="gradio" + google-query: intitle:"gradio" + tags: cve,cve2024,redirect,oast,gradio + +http: + - raw: + - | + GET /file=http%3A%2F%2Foast.pro/ HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)oast\.pro.*$' + part: header + + - type: status + status: + - 302