42 lines
1.8 KiB
YAML
42 lines
1.8 KiB
YAML
id: CVE-2015-5461
|
|
|
|
info:
|
|
name: WordPress StageShow <5.0.9 - Open Redirect
|
|
author: 0x_Akoko
|
|
severity: medium
|
|
description: WordPress StageShow plugin before 5.0.9 contains an open redirect vulnerability in the Redirect function in stageshow_redirect.php. A remote attacker can redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the url parameter.
|
|
remediation: |
|
|
Update to the latest version of the WordPress StageShow plugin (5.0.9 or higher) to fix the open redirect vulnerability.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16
|
|
- https://wordpress.org/plugins/stageshow/changelog/
|
|
- http://seclists.org/fulldisclosure/2015/Jul/27
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-5461
|
|
- https://plugins.trac.wordpress.org/changeset/1165310/
|
|
classification:
|
|
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:N
|
|
cvss-score: 6.4
|
|
cve-id: CVE-2015-5461
|
|
cwe-id: NVD-CWE-Other
|
|
epss-score: 0.0055
|
|
epss-percentile: 0.74898
|
|
cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: stageshow_project
|
|
product: stageshow
|
|
framework: wordpress
|
|
google-query: inurl:"/wp-content/plugins/stageshow/"
|
|
tags: wpscan,seclists,redirect,cve,cve2015,wordpress,wp-plugin
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh"
|
|
|
|
matchers:
|
|
- type: regex
|
|
part: header
|
|
regex:
|
|
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
|
# digest: 4a0a004730450221008694095a0f6e8439628a5bf016fcec0103b164fb04a65377ae74a138ebc6b1210220738966fe7e64c2f853c1b03c157c42b8d6abccea53a9a7f9f686009b30cc9bcf:922c64590222798bb761d5b6d8e72950 |