nuclei-templates/http/cves/2015/CVE-2015-5461.yaml

35 lines
1.2 KiB
YAML

id: CVE-2015-5461
info:
name: WordPress StageShow <5.0.9 - Open Redirect
author: 0x_Akoko
severity: medium
description: WordPress StageShow plugin before 5.0.9 contains an open redirect vulnerability in the Redirect function in stageshow_redirect.php. A remote attacker can redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the url parameter.
reference:
- https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16
- https://wordpress.org/plugins/stageshow/changelog/
- http://seclists.org/fulldisclosure/2015/Jul/27
- https://nvd.nist.gov/vuln/detail/CVE-2015-5461
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:N
cvss-score: 6.4
cve-id: CVE-2015-5461
cwe-id: NVD-CWE-Other
metadata:
max-request: 1
google-query: inurl:"/wp-content/plugins/stageshow/"
tags: wpscan,seclists,redirect,cve,cve2015,wordpress,wp-plugin
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh"
matchers:
- type: regex
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
# Enhanced by mp on 2022/09/30