nuclei-templates/http/cves/2010/CVE-2010-1586.yaml

41 lines
1.7 KiB
YAML

id: CVE-2010-1586
info:
name: HP System Management Homepage (SMH) v2.x.x.x - Open Redirect
author: ctflearner
severity: medium
description: |
Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
impact: |
An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware.
remediation: |
Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1586
- https://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58107
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2010-1586
cwe-id: CWE-20
epss-score: 0.00917
epss-percentile: 0.81032
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hp
product: system_management_homepage
tags: cve,cve2010,redirect,smh,hp
http:
- method: GET
path:
- "{{BaseURL}}/red2301.html?RedirectUrl=http://interact.sh"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a004630440220096ee755e28cfd4b0b033c34ef6523da4772378fab56cb37f7968e0547e43f8b0220601f13af2d58faa914ab66670384d1dc19446e5dff304827d045f4a7c5f393c0:922c64590222798bb761d5b6d8e72950