Create CVE-2021-24210.yaml
parent
2d826f3391
commit
d297d66b40
|
@ -0,0 +1,20 @@
|
||||||
|
id: CVE-2021-24210
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: PhastPress < 1.111 - Open Redirect
|
||||||
|
author: 0x_Akoko
|
||||||
|
description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page.
|
||||||
|
reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb
|
||||||
|
severity: low
|
||||||
|
tags: wp,cves,redirect
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Fexample.com"
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
|
||||||
|
part: header
|
Loading…
Reference in New Issue