add cve-2024-0337 open redirect
parent
98671ddba7
commit
7d7c52dadc
|
@ -0,0 +1,24 @@
|
|||
id: CVE-2024-0337
|
||||
info:
|
||||
name: Travelpayouts <= 1.1.16 - Open Redirect
|
||||
author: Kazgangap
|
||||
severity: medium
|
||||
description: |
|
||||
The plugin is vulnerable to Open Redirect due to insufficient validation on the travelpayouts_redirect variable. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/
|
||||
classification:
|
||||
epss-score: 0.00043
|
||||
epss-percentile: 0.07895
|
||||
tags: wpscan,cve2024,wordpress,redirect
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/?travelpayouts_redirect=https://interact.sh"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
Loading…
Reference in New Issue