Update CVE-2012-6499.yaml
parent
3fea066dff
commit
84558d10b6
|
@ -1,4 +1,5 @@
|
|||
id: CVE-2012-6499
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Age Verification v0.4 - Open Redirect
|
||||
author: ctflearner
|
||||
|
@ -7,6 +8,7 @@ info:
|
|||
Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/36540
|
||||
- https://wordpress.org/plugins/age-verification
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2012-6499
|
||||
classification:
|
||||
cvss-metrics: AV:N/AC:M/Au:N/C:P/I:P/A:N
|
||||
|
@ -14,15 +16,15 @@ info:
|
|||
cve-id: CVE-2012-6499
|
||||
cwe-id: CWE-20
|
||||
cpe: cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:*
|
||||
tags: cve,cve2012,redirect,WordPress Plugin,Age Verification
|
||||
tags: cve,cve2012,wordpress,wp,wp-plugin,redirect,age-verification
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/age-verification/age-verification.php?redirect_to=http%3A%2F%2Fwww.evil.com"
|
||||
- "{{BaseURL}}/wp-content/plugins/age-verification/age-verification.php?redirect_to=http%3A%2F%2Fwww.interact.sh"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)evil\.com\/?(\/|[^.].*)?$'
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
|
Loading…
Reference in New Issue