Update and rename CVE-2018-14931.yaml to cves/2018/CVE-2018-14931.yaml

patch-1
Prince Chaddha 2022-04-18 13:34:00 +04:00 committed by GitHub
parent b533258c88
commit 6f30f445ad
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 4 deletions

View File

@ -1,19 +1,19 @@
id: CVE-2018-14931
info:
name: Polarisft Intellect Core Banking Software Version 9.7.1- Open Redirect
name: Polarisft Intellect Core Banking Software Version 9.7.1 - Open Redirect
author: 0x_Akoko
severity: low
description: An issue was discovered in the Core and Portal modules in Polaris FT Intellect Core Banking 9.7.1. An open redirect exists via a /IntellectMain.jsp?IntellectSystem= URI.
reference:
- https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html
- https://www.cvedetails.com/cve/CVE-2018-14931
tags: cve,cve2018,redirect,polarisft
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2018-14931
cwe-id: CWE-601
tags: cve,cve2018,redirect,polarisft,intellect
requests:
- method: GET
@ -23,6 +23,6 @@ requests:
matchers:
- type: regex
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1