Polarisft Intellect Core Banking Software Version 9.7.1 - Open Redirect
ID: CVE-2018-14931
Severity: medium
Author: 0x_Akoko
Tags: cve,cve2018,redirect,polarisft,intellect
Description
Section titled “Description”Polarisft Intellect Core Banking Software Version 9.7.1 is susceptible to an open redirect issue in the Core and Portal modules via the /IntellectMain.jsp?IntellectSystem= URI.
YAML Source
Section titled “YAML Source”id: CVE-2018-14931
info: name: Polarisft Intellect Core Banking Software Version 9.7.1 - Open Redirect author: 0x_Akoko severity: medium description: Polarisft Intellect Core Banking Software Version 9.7.1 is susceptible to an open redirect issue in the Core and Portal modules via the /IntellectMain.jsp?IntellectSystem= URI. impact: | An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the theft of sensitive information. remediation: | Apply the latest security patches or updates provided by Polarisft to fix the open redirect vulnerability. reference: - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html - https://nvd.nist.gov/vuln/detail/CVE-2018-14931 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-14931 cwe-id: CWE-601 epss-score: 0.00118 epss-percentile: 0.45948 cpe: cpe:2.3:a:polarisft:intellect_core_banking:9.7.1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: polarisft product: intellect_core_banking tags: cve,cve2018,redirect,polarisft,intellect
http: - method: GET path: - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.interact.sh'
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1# digest: 4a0a004730450221009d5cd93a23178d537af3aa37aef682ef5ac23c87022a35ea36b5471ee73f7ac10220576012351d8c76615162e7a5d75ff6f2a0c90fa2ab29715c3ce3fd0fc2e5b780:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-14931.yaml"