Skip to content

Autonomy Ultraseek - Open Redirect

ID: CVE-2009-0347

Severity: medium

Author: ctflearner

Tags: cve,cve2009,redirect,autonomy

Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.

id: CVE-2009-0347
info:
name: Autonomy Ultraseek - Open Redirect
author: ctflearner
severity: medium
description: |
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
impact: |
An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks.
remediation: |
Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-0347
- https://www.exploit-db.com/exploits/32766
- https://www.kb.cert.org/vuls/id/202753
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48336
- http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
cvss-score: 5.8
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.10607
epss-percentile: 0.94532
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: autonomy
product: ultraseek
tags: cve,cve2009,redirect,autonomy
http:
- method: GET
path:
- "{{BaseURL}}/cs.html?url=http://www.interact.sh"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4a0a00473045022069c071aaa96fe6d14be6846fa547dbf3ae243f255268e46cb3478e7efaa3ad42022100be901103b9e87521388bc3bab680d194bc8ddf05b5d789b005110ee327a73757:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2009/CVE-2009-0347.yaml"

View on Github