fixed template

patch-1
Dhiyaneshwaran 2023-02-14 19:40:38 +05:30 committed by GitHub
parent 192ae9c929
commit 5de22b7f55
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 15 additions and 27 deletions

View File

@ -1,44 +1,32 @@
id: CVE-2022-28923 id: CVE-2022-28923
info: info:
name: Caddy Open Redirect [CVE-2022-28923] name: Caddy 2.4.6 Open Redirect
author: Sascha Brendel | Lednerb IT-Security GmbH | lednerb.de author: Sascha Brendel,DhiyaneshDk
severity: medium severity: medium
description: | description: |
Caddy version 2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs. Caddy version 2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs.
reference:
- https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/
- https://www.cve.org/CVERecord?id=CVE-2022-28923
- https://github.com/caddyserver/caddy/issues/4502
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1 cvss-score: 6.1
cve-id: CVE-2022-28923 cve-id: CVE-2022-28923
cwe-id: CWE-601 cwe-id: CWE-601
reference: metadata:
- https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/ verified: "true"
- https://www.cve.org/CVERecord?id=CVE-2022-28923 shodan-query: "Server: caddy"
tags: cve,cve2022,redirect,caddy,webserver tags: cve,cve2022,redirect,caddy,webserver
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/%5C%5Cexample.org/%252e%252e%252f" - '{{BaseURL}}/%5C%5Cinteract\.sh/%252e%252e%252f'
redirects: false
max-redirects: 3
matchers-condition: and
matchers: matchers:
# Match permanent redirect - type: regex
- type: status
status:
- 308
# Only match caddy-Server
- type: word
words:
- "Server: Caddy"
- "Server: caddy"
condition: or
part: header part: header
regex:
# Do not match redirects to / - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
- type: word
part: body
negative: true
words:
- '<a href="/">'