AWStats < 6.95 - Open Redirect
ID: CVE-2009-5020
Severity: medium
Author: pdteam
Tags: cve2009,cve,redirect,awstats
Description
Section titled “Description”An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
YAML Source
Section titled “YAML Source”id: CVE-2009-5020
info: name: AWStats < 6.95 - Open Redirect author: pdteam severity: medium description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. impact: | Allows attackers to redirect users to malicious websites or phishing pages. remediation: Apply all relevant security patches and product upgrades. reference: - https://nvd.nist.gov/vuln/detail/CVE-2009-5020 - http://awstats.sourceforge.net/docs/awstats_changelog.txt - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P cvss-score: 5.8 cve-id: CVE-2009-5020 cwe-id: CWE-20 epss-score: 0.00253 epss-percentile: 0.65112 cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: awstats product: awstats shodan-query: cpe:"cpe:2.3:a:laurent_destailleur:awstats" tags: cve2009,cve,redirect,awstats
http: - method: GET path: - '{{BaseURL}}/awstats/awredir.pl?url=interact.sh' - '{{BaseURL}}/cgi-bin/awstats/awredir.pl?url=interact.sh'
stop-at-first-match: true matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1# digest: 4a0a004730450220633fe871e1af9af841621c994f569bcf7507eedc0e258c035fcbe84f81a90a2c022100e4aeb60cf1bf34fa3fd2d2c8a7e47f767930a4cc40119942d0136d3c4276f684:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2009/CVE-2009-5020.yaml"