Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2010-1586
HistoryJun 11, 2023 - 5:56 a.m.

HP System Management Homepage (SMH) v2.x.x.x - Open Redirect

2023-06-1105:56:26
ProjectDiscovery
github.com
2

6.6 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.009 Low

EPSS

Percentile

82.7%

Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
id: CVE-2010-1586

info:
  name: HP System Management Homepage (SMH) v2.x.x.x - Open Redirect
  author: ctflearner
  severity: medium
  description: |
    Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
  impact: |
    An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware.
  remediation: |
    Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
  reference:
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1586
    - https://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/58107
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
    cvss-score: 4.3
    cve-id: CVE-2010-1586
    cwe-id: CWE-20
    epss-score: 0.00917
    epss-percentile: 0.81107
    cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: hp
    product: system_management_homepage
  tags: cve,cve2010,redirect,smh,hp

http:
  - method: GET
    path:
      - "{{BaseURL}}/red2301.html?RedirectUrl=http://interact.sh"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4b0a00483046022100f57a607443ab3d3afbecb32664f1d6143de739eaf0a9af290671f808ee175f33022100f241d17fa92db4be2755072bfe591fc4fe9d6dc10f24f02fecf152f383bc496f:922c64590222798bb761d5b6d8e72950

6.6 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.009 Low

EPSS

Percentile

82.7%

Related for NUCLEI:CVE-2010-1586