updated info

patch-4
Ritik Chaddha 2024-06-11 14:52:25 +05:30 committed by GitHub
parent e65dc0b3f2
commit f84d3ab6b3
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 10 additions and 5 deletions

View File

@ -1,24 +1,29 @@
id: CVE-2023-6786 id: CVE-2023-6786
info: info:
name: Payment Gateway for Telcell < 2.0.4 - Open Redirect name: Payment Gateway for Telcell < 2.0.4 - Open Redirect
author: securityforeveryone.com author: securityforeveryone.com
severity: medium severity: medium
description: | description: |
The plugin does not validate the api_url parameter before redirecting the user to its value, leading to an Open Redirect issue The plugin does not validate the api_url parameter before redirecting the user to its value, leading to an Open Redirect issue
remediation: Fixed in 2.0.4 remediation: |
Fixed in 2.0.4
reference: reference:
- https://wpscan.com/vulnerability/f3e64947-3138-4ec4-86c4-27b5d6a5c9c2/ - https://wpscan.com/vulnerability/f3e64947-3138-4ec4-86c4-27b5d6a5c9c2/
- https://nvd.nist.gov/vuln/detail/CVE-2023-6786
classification:
cve-id: CVE-2023-6786
metadata: metadata:
publicwww-query: inurl:"/wp-content/plugins/payment-gateway-for-telcell max-request: 1
tags: wpscan,wordpress,redirect,wp-plugin,cve,cve2023 verified: true
publicwww-query: "/wp-content/plugins/payment-gateway-for-telcell"
tags: cve,cve2023,wordpress,redirect,wp-plugin,wp,payment-gateway-for-telcell
http: http:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/wp-admin/admin.php?page=wc-settings&action=redirect_telcell_form&api_url=https://oast.me" - "{{BaseURL}}/wp-admin/admin.php?page=wc-settings&action=redirect_telcell_form&api_url=https://oast.me"
redirects: true
max-redirects: 2
matchers: matchers:
- type: regex - type: regex
part: header part: header