Apache Tomcat - Open Redirect
ID: CVE-2018-11784
Severity: medium
Author: geeknik
Tags: cve,cve2018,packetstorm,tomcat,redirect,apache
Description
Section titled “Description”Apache Tomcat versions prior to 9.0.12, 8.5.34, and 7.0.91 are prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input.
YAML Source
Section titled “YAML Source”id: CVE-2018-11784
info: name: Apache Tomcat - Open Redirect author: geeknik severity: medium description: | Apache Tomcat versions prior to 9.0.12, 8.5.34, and 7.0.91 are prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input. impact: | An attacker can redirect users to malicious websites, leading to phishing attacks or the download of malware. remediation: | Upgrade to Apache Tomcat version 9.0.12 or later, or apply the relevant patch provided by the Apache Software Foundation. reference: - https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E - https://nvd.nist.gov/vuln/detail/CVE-2018-11784 - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html - http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N cvss-score: 4.3 cve-id: CVE-2018-11784 cwe-id: CWE-601 epss-score: 0.79069 epss-percentile: 0.9827 cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: tomcat shodan-query: - title:"Apache Tomcat" - http.title:"apache tomcat" - http.html:"apache tomcat" - cpe:"cpe:2.3:a:apache:tomcat" fofa-query: - body="apache tomcat" - title="apache tomcat" google-query: intitle:"apache tomcat" tags: cve,cve2018,packetstorm,tomcat,redirect,apache
http: - method: GET path: - "{{BaseURL}}//interact.sh"
matchers-condition: and matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*\.)?interact\.sh\/?(\/.*)?$'
- type: status negative: true status: - 404# digest: 4a0a00473045022100b8506d1d26e0eb974e7c8d7d58ae66b6c1f8cc4ff2c6686eaf252cbbeefcca99022006c61558b2d7a93825776e69e399aa69834cae8c0efed465979e494836f18e1d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-11784.yaml"