From bf11ca445164857043f784888af06b2ba672734a Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Sat, 13 Jul 2024 20:58:41 +0530 Subject: [PATCH] Create CVE-2023-29204.yaml --- http/cves/2023/CVE-2023-29204.yaml | 44 ++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 http/cves/2023/CVE-2023-29204.yaml diff --git a/http/cves/2023/CVE-2023-29204.yaml b/http/cves/2023/CVE-2023-29204.yaml new file mode 100644 index 0000000000..42aef997f6 --- /dev/null +++ b/http/cves/2023/CVE-2023-29204.yaml @@ -0,0 +1,44 @@ +id: CVE-2023-29204 + +info: + name: XWiki - Open Redirect + author: ritikchaddha + severity: medium + description: | + XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. + impact: | + An attacker can redirect users to malicious websites, leading to phishing attacks or malware downloads. + remediation: | + Implement proper input validation and sanitize user-controlled input to prevent open redirect vulnerabilities. + reference: + - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv + - https://jira.xwiki.org/browse/XWIKI-10309 + - https://jira.xwiki.org/browse/XWIKI-19994 + - https://nvd.nist.gov/vuln/detail/CVE-2023-29204 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-29204 + cwe-id: CWE-601 + epss-score: 0.00094 + epss-percentile: 0.39237 + cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: xwiki + product: xwiki + shodan-query: html:"data-xwiki-reference" + fofa-query: body="data-xwiki-reference" + tags: cve,cve2023,xwiki,redirect + +http: + - method: GET + path: + - "{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=//www.oast.me" + - "{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=http:/www.oast.me" + + matchers: + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1