From 7909fb06fdc18fd6e7096a455a3fe3b03cd4e8f8 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 20 Jun 2023 00:07:45 +0530 Subject: [PATCH] updated req --- http/cves/2012/CVE-2012-6499.yaml | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index 51013875b4..9b5a7bbf67 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -7,7 +7,7 @@ info: description: | Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter. reference: - - https://www.exploit-db.com/exploits/36540 + - https://www.exploit-db.com/exploits/18350 - https://wordpress.org/plugins/age-verification - https://nvd.nist.gov/vuln/detail/CVE-2012-6499 classification: @@ -19,9 +19,12 @@ info: tags: cve,cve2012,wordpress,wp,wp-plugin,redirect,age-verification http: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/age-verification/age-verification.php?redirect_to=http%3A%2F%2Fwww.interact.sh" + - raw: + - | + POST /wp-content/plugins/age-verification/age-verification.php HTTP/1.1 + Host: {{Hostname}} + + redirect_to=http://www.interact.sh&age_day=1&age_month=1&age_year=1970 matchers: - type: regex