diff --git a/http/cves/2019/CVE-2019-10098.yaml b/http/cves/2019/CVE-2019-10098.yaml index ddb7c76019..348bc4013b 100644 --- a/http/cves/2019/CVE-2019-10098.yaml +++ b/http/cves/2019/CVE-2019-10098.yaml @@ -5,7 +5,7 @@ info: author: ctflearner severity: medium description: | - In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL. + In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL. reference: - https://www.exploit-db.com/exploits/47689 - https://nvd.nist.gov/vuln/detail/CVE-2019-10098 @@ -19,15 +19,15 @@ info: cve-id: CVE-2019-10098 cwe-id: CWE-601 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* - tags: cve,cve2019,redirect,Apache HTTP server + tags: cve,cve2019,redirect,apache,server http: - method: GET path: - - "{{BaseURL}}/http%3A%2F%2Fwww.evil.com" + - "{{BaseURL}}/http%3A%2F%2Fwww.interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)evil\.com\/?(\/|[^.].*)?$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'