Update newsletter-open-redirect.yaml
parent
2d745615c5
commit
fea65848db
|
@ -6,7 +6,7 @@ info:
|
|||
severity: medium
|
||||
description: The plugin used base64 encoded user input in the appurl parameter without validation, to redirect users using the header() PHP function, leading to an open redirect issue.
|
||||
reference: https://wpscan.com/vulnerability/847b3878-da9e-47d6-bc65-3cfd2b3dc1c1
|
||||
tags: wordpress,redirect,wp-plugin,newsletter
|
||||
tags: wordpress,redirect,wp-plugin,newsletter,wp
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -16,5 +16,5 @@ requests:
|
|||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)?(?:[a-zA-Z0-9\-_\.@]*)google\.com.*$'
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)google\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
|
||||
part: header
|
||||
|
|
Loading…
Reference in New Issue