Create CVE-2021-24210.yaml

patch-1
Roberto Nunes 2021-06-29 19:03:18 +09:00 committed by GitHub
parent 2d826f3391
commit d297d66b40
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 20 additions and 0 deletions

20
CVE-2021-24210.yaml Normal file
View File

@ -0,0 +1,20 @@
id: CVE-2021-24210
info:
name: PhastPress < 1.111 - Open Redirect
author: 0x_Akoko
description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page.
reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb
severity: low
tags: wp,cves,redirect
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Fexample.com"
matchers:
- type: regex
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
part: header