Eleanor CMS Open Redirect

2014-11-12T00:00:00
ID PACKETSTORM:129087
Type packetstorm
Reporter Renzi
Modified 2014-11-12T00:00:00

Description

                                        
                                            `# URL Open Redirect on Eleanor CMS  
  
# Risk: Low  
  
# CWE number: CWE-601  
  
# Vendor: eleanor-cms.ru  
  
# Version: All  
  
# Date: 11/11/2014  
  
# Author: Felipe " Renzi " Gabriel  
  
# Contact: renzi@linuxmail.org  
  
# Tested on Linux Ubuntu 14.04 ; Mozilla Firefox 33.0  
  
# Vulnerable File: go.php  
  
# Exploit:  
  
[+] http://host.com/go.php?http://site.com  
  
# PoC:  
[+] http://forum.eleanor-cms.ru/go.php?http://www.uol.com.br  
  
  
  
# Note: Open redirect (CWE-601) allows phishing attack to be more effective.  
Redirection is commonly used within all web applications for various  
purposes.("Jason Lam" ~ Top 25 Series - Rank 23 - Open Redirect)  
  
# Reference: http://software-security.sans.org  
  
# Thank's  
  
  
  
  
  
  
  
  
  
`