Skip to content

HP System Management Homepage (SMH) v2.x.x.x - Open Redirect

ID: CVE-2010-1586

Severity: medium

Author: ctflearner

Tags: cve,cve2010,redirect,smh,hp

Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.

id: CVE-2010-1586
info:
name: HP System Management Homepage (SMH) v2.x.x.x - Open Redirect
author: ctflearner
severity: medium
description: |
Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
impact: |
An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware.
remediation: |
Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1586
- https://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58107
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2010-1586
cwe-id: CWE-20
epss-score: 0.00917
epss-percentile: 0.81107
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hp
product: system_management_homepage
tags: cve,cve2010,redirect,smh,hp
http:
- method: GET
path:
- "{{BaseURL}}/red2301.html?RedirectUrl=http://interact.sh"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a00463044022050681912dee2c792a43d6eb904baeb8ef631ec7b23ba5ca8e3007c11646f6e54022054a818b195aa0a1205f083ec372fca3eba83dab399be04743739f510425b5911:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2010/CVE-2010-1586.yaml"

View on Github