Apache HTTP server v2.4.0 to v2.4.39 - Open Redirect
ID: CVE-2019-10098
Severity: medium
Author: ctflearner
Tags: cve,cve2019,redirect,apache,server
Description
Section titled “Description”In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
YAML Source
Section titled “YAML Source”id: CVE-2019-10098
info: name: Apache HTTP server v2.4.0 to v2.4.39 - Open Redirect author: ctflearner severity: medium description: | In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL. impact: | An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware. remediation: | Upgrade Apache HTTP server to version 2.4.40 or later to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/47689 - https://nvd.nist.gov/vuln/detail/CVE-2019-10098 - https://www.openwall.com/lists/oss-security/2020/04/01/4 - https://httpd.apache.org/security/vulnerabilities_24.html - https://www.oracle.com/security-alerts/cpuapr2021.html - https://www.oracle.com/security-alerts/cpuoct2019.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-10098 cwe-id: CWE-601 epss-score: 0.10593 epss-percentile: 0.94527 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: http_server shodan-query: - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 tags: cve,cve2019,redirect,apache,server
http: - method: GET path: - "{{BaseURL}}/http%3A%2F%2Fwww.interact.sh"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'# digest: 490a00463044022046a74d03e3edfbb0225a444819e1844eb5ed1a173a59f7a08cd65c26b639e2fd022008c60b3466a8bfdd723845b57e227b2efb1812a555ab92b58991225302f3cf50:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-10098.yaml"