b2evolution CMS <6.11.6 - Open Redirect
ID: CVE-2020-22840
Severity: medium
Author: geeknik
Tags: cve,cve2020,packetstorm,edb,redirect,b2evolution
Description
Section titled “Description”b2evolution CMS before 6.11.6 contains an open redirect vulnerability via the redirect_to parameter in email_passthrough.php. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2020-22840
info: name: b2evolution CMS <6.11.6 - Open Redirect author: geeknik severity: medium description: b2evolution CMS before 6.11.6 contains an open redirect vulnerability via the redirect_to parameter in email_passthrough.php. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | This vulnerability can be exploited by attackers to trick users into visiting malicious websites, potentially leading to phishing attacks, malware infections, or unauthorized access to sensitive information. remediation: | Upgrade b2evolution CMS to version 6.11.6 or later to mitigate the open redirect vulnerability (CVE-2020-22840). reference: - https://github.com/b2evolution/b2evolution/issues/102 - http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html - https://www.exploit-db.com/exploits/49554 - https://nvd.nist.gov/vuln/detail/CVE-2020-22840 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2020-22840 cwe-id: CWE-601 epss-score: 0.01031 epss-percentile: 0.83821 cpe: cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: b2evolution product: b2evolution tags: cve,cve2020,packetstorm,edb,redirect,b2evolution
http: - method: GET path: - "{{BaseURL}}/email_passthrough.php?email_ID=1&type=link&email_key=5QImTaEHxmAzNYyYvENAtYHsFu7fyotR&redirect_to=http%3A%2F%2Finteract.sh"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'# digest: 490a00463044022014dfb14b0e3effb6c0bb55f214101cf0212b935aa9bd6704940b674daa0004a2022063bb1aef386d8c9c763f40b5a08257f6056763c881fc874eec835c67d65f5e47:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-22840.yaml"