Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2008-7269
HistoryJun 11, 2023 - 6:07 a.m.

UC Gateway Investment SiteEngine v5.0 - Open Redirect

2023-06-1106:07:22
ProjectDiscovery
github.com
12
vulnerability
remote attackers
arbitrary websites
url
logout action
vendor updates
siteengine
boka

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.5

Confidence

High

EPSS

0.015

Percentile

87.2%

Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
id: CVE-2008-7269

info:
  name: UC Gateway Investment SiteEngine v5.0 - Open Redirect
  author: ctflearner
  severity: medium
  description: |
    Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
  remediation: |
    Apply the latest patches or updates provided by the vendor to fix the open redirect vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2008-7269
    - https://www.exploit-db.com/exploits/6823
    - https://github.com/tr3ss/newclei
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
    cvss-score: 5.8
    cve-id: CVE-2008-7269
    cwe-id: CWE-20
    epss-score: 0.01544
    epss-percentile: 0.87118
    cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
  metadata:
    verified: "true"
    max-request: 1
    vendor: boka
    product: siteengine
    shodan-query:
      - html:"SiteEngine"
      - http.html:"siteengine"
    fofa-query: body="siteengine"
  tags: cve,cve2008,redirect,siteengine,boka

http:
  - method: GET
    path:
      - "{{BaseURL}}/api.php?action=logout&forward=http://interact.sh"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4a0a0047304502206cfd3ce47bdd3c6cbf2fdd81c29180bd8f8f05e9b31f1d8f0c7a02b9d2ed0f52022100f8e324955cf0e9c6d7a0de24bcde29fd750c959594a8b5b8f600c7d5b999d232:922c64590222798bb761d5b6d8e72950

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.5

Confidence

High

EPSS

0.015

Percentile

87.2%

Related for NUCLEI:CVE-2008-7269