From d1e07a5839d39a377a0951abc177ad4554f22a50 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 20 Nov 2023 13:59:27 +0530 Subject: [PATCH] Create CVE-2023-5375.yaml --- http/cves/2023/CVE-2023-5375.yaml | 37 +++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 http/cves/2023/CVE-2023-5375.yaml diff --git a/http/cves/2023/CVE-2023-5375.yaml b/http/cves/2023/CVE-2023-5375.yaml new file mode 100644 index 0000000000..19e167d191 --- /dev/null +++ b/http/cves/2023/CVE-2023-5375.yaml @@ -0,0 +1,37 @@ +id: CVE-2023-5375 + +info: + name: mosparo - Open Redirect + author: Shankar Acharya + severity: medium + description: | + Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2. + remediation: | + Update to the latest version of mosparo to fix the open redirect vulnerability. + reference: + - https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-5375 + cwe-id: CWE-601 + epss-score: 0.00071 + epss-percentile: 0.29589 + cpe:2.3:a:mosparo:mosparo:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: mosparo + product: mosparo.io + tags: cve,cve2023,mosparo,redirect + +http: + - method: GET + path: + - "{{BaseURL}}/project/switch/1?targetPath=http://oast.pro" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.pro.*$' + part: header