Update and rename CVE-2015-5461.yaml to cves/2015/CVE-2015-5461.yaml
parent
6e7b1d9514
commit
c8094b0987
|
@ -1,20 +0,0 @@
|
|||
id: CVE-2015-5461
|
||||
|
||||
info:
|
||||
name: StageShow <= 5.0.8 - Open Redirect
|
||||
author: 0x_Akoko
|
||||
description: The StageShow WordPress plugin was affected by an Open Redirect security vulnerability.
|
||||
reference: https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16
|
||||
severity: medium
|
||||
tags: redirect,cves,wp
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
|
||||
part: header
|
|
@ -0,0 +1,22 @@
|
|||
id: CVE-2015-5461
|
||||
|
||||
info:
|
||||
name: StageShow <= 5.0.8 - Open Redirect
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: Open redirect vulnerability in the Redirect function in stageshow_redirect.php in the StageShow plugin before 5.0.9 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2015-5461
|
||||
tags: redirect,cve,cve2015,wordpress,wp-plugin
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
|
||||
part: header
|
Loading…
Reference in New Issue