Update newsletter-open-redirect.yaml

patch-1
Prince Chaddha 2022-02-15 16:33:09 +05:30 committed by GitHub
parent 2d745615c5
commit fea65848db
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -6,7 +6,7 @@ info:
severity: medium
description: The plugin used base64 encoded user input in the appurl parameter without validation, to redirect users using the header() PHP function, leading to an open redirect issue.
reference: https://wpscan.com/vulnerability/847b3878-da9e-47d6-bc65-3cfd2b3dc1c1
tags: wordpress,redirect,wp-plugin,newsletter
tags: wordpress,redirect,wp-plugin,newsletter,wp
requests:
- method: GET
@ -16,5 +16,5 @@ requests:
matchers:
- type: regex
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)?(?:[a-zA-Z0-9\-_\.@]*)google\.com.*$'
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)google\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
part: header