Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-14223
HistoryJan 09, 2021 - 2:45 p.m.

Alfresco Share - Open Redirect

2021-01-0914:45:11
ProjectDiscovery
github.com
3
alfresco
share
open redirect
vulnerability
crafted
post request
phishing
attack
sensitive information
security vulnerability

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

58.6%

Alfresco Share before 5.2.6, 6.0.N and 6.1.N contains an open redirect vulnerability via a crafted POST request. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

id: CVE-2019-14223

info:
  name: Alfresco Share - Open Redirect
  author: pdteam
  severity: medium
  description: Alfresco Share before 5.2.6, 6.0.N and 6.1.N contains an open redirect vulnerability via a crafted POST request. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    An attacker can trick users into visiting a malicious website, leading to potential phishing attacks or the disclosure of sensitive information.
  remediation: |
    Apply the latest security patches or updates provided by Alfresco to fix the open redirect vulnerability.
  reference:
    - https://community.alfresco.com/content?filterID=all~objecttype~thread%5Bquestions%5D
    - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community
    - https://nvd.nist.gov/vuln/detail/CVE-2019-14223
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/Elsfa7-110/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2019-14223
    cwe-id: CWE-601
    epss-score: 0.00205
    epss-percentile: 0.58403
    cpe: cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*
  metadata:
    max-request: 1
    vendor: alfresco
    product: alfresco
  tags: cve,cve2019,redirect,alfresco

http:
  - method: POST
    path:
      - '{{BaseURL}}/share/page/dologin'

    body: |
      success=%2Fshare%2Fpage%2F&failure=:\\interact.sh&username=baduser&password=badpass

    headers:
      Content-Type: application/x-www-form-urlencoded
    matchers:
      - type: regex
        part: header
        regex:
          - "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?interact\\.sh(?:\\s*)$"
# digest: 490a0046304402205d5f0ef95ddabc2bdbaa24ca65c591518b64e1c5a76acbdd6a4761dc87127fad022024f70af5b612de0111602d874662511ee3f43f639e34344c50ee4178e2f69f7f:922c64590222798bb761d5b6d8e72950

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

58.6%

Related for NUCLEI:CVE-2019-14223