From a11f95b8bf28a9e7192bab000a1b4b58b7a7730f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 30 Apr 2022 01:49:48 +0530 Subject: [PATCH] Create CVE-2021-25111.yaml --- cves/2021/CVE-2021-25111.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 cves/2021/CVE-2021-25111.yaml diff --git a/cves/2021/CVE-2021-25111.yaml b/cves/2021/CVE-2021-25111.yaml new file mode 100644 index 0000000000..ba1059e958 --- /dev/null +++ b/cves/2021/CVE-2021-25111.yaml @@ -0,0 +1,21 @@ +id: CVE-2021-25111 + +info: + name: English WordPress Admin < 1.5.2 - Unauthenticated Open Redirect + author: akincibor + severity: low + description: The plugin does not validate the admin_custom_language_return_url before redirecting users o it, leading to an open redirect issue. + reference: + - https://wpscan.com/vulnerability/af548fab-96c2-4129-b609-e24aad0b1fc4 + tags: wp-plugin,redirect,wordpress,wp,cve,cve2021,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=heartbeat&admin_custom_language_toggle=1&admin_custom_language_return_url=https://example.com" + + matchers: + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1