nuclei-templates/http/cves/2009/CVE-2009-0347.yaml

38 lines
1.2 KiB
YAML

id: CVE-2009-0347
info:
name: Autonomy Ultraseek - Open Redirect
author: ctflearner
severity: medium
description: |
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-0347
- https://www.exploit-db.com/exploits/32766
- https://www.kb.cert.org/vuls/id/202753
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48336
- http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
cvss-score: 5.8
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.08272
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: autonomy
product: ultraseek
tags: cve,cve2009,redirect,autonomy
http:
- method: GET
path:
- "{{BaseURL}}/cs.html?url=http://www.interact.sh"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'