We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.
id: CVE-2023-33405 info: name: BlogEngine CMS - Open Redirect author: Shankar Acharya severity: medium description: | Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect reference: - https://github.com/hacip/CVE-2023-33405 - https://nvd.nist.gov/vuln/detail/CVE-2023-33405 remediation: | Update to the latest version of blogengine.net CMS to fix the open redirect vulnerability. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/Au:N/C:N/I:P/A:N cvss-score: 6.1 cve-id: CVE-2023-33405 cwe-id: CWE-601 metadata: max-request: 1 product: blogengine_cms vendor: blogengine verified: true tags: cve,cve2023,Blogengine,cms,redirect http: - method: GET path: - "{{BaseURL}}/default.aspx?years=http://interact.sh" matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
Reference
https://www.opencve.io/cve/CVE-2023-33405 https://cve.report/CVE-2023-33405
The text was updated successfully, but these errors were encountered:
pussycat0x
Successfully merging a pull request may close this issue.
Template Information:
Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.
Nuclei Template:
Reference
https://www.opencve.io/cve/CVE-2023-33405
https://cve.report/CVE-2023-33405
The text was updated successfully, but these errors were encountered: