EyouCMS 1.5.4 Open Redirect
ID: CVE-2021-39501
Severity: medium
Author: 0x_Akoko
Tags: cve2021,cve,redirect,eyoucms,cms
Description
Section titled “Description”EyouCMS 1.5.4 is vulnerable to an Open Redirect vulnerability. An attacker can redirect a user to a malicious url via the Logout function.
YAML Source
Section titled “YAML Source”id: CVE-2021-39501
info: name: EyouCMS 1.5.4 Open Redirect author: 0x_Akoko severity: medium description: EyouCMS 1.5.4 is vulnerable to an Open Redirect vulnerability. An attacker can redirect a user to a malicious url via the Logout function. impact: | Successful exploitation of this vulnerability could lead to phishing attacks, credential theft,. remediation: | Apply the latest security patch or upgrade to a newer version of EyouCMS to mitigate the vulnerability. reference: - https://github.com/eyoucms/eyoucms/issues/17 - https://github.com/KietNA-HPT/CVE - https://nvd.nist.gov/vuln/detail/CVE-2021-39501 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-39501 cwe-id: CWE-601 epss-score: 0.00141 epss-percentile: 0.49694 cpe: cpe:2.3:a:eyoucms:eyoucms:1.5.4:*:*:*:*:*:*:* metadata: max-request: 1 vendor: eyoucms product: eyoucms fofa-query: title="eyoucms" tags: cve2021,cve,redirect,eyoucms,cms
http: - method: GET path: - '{{BaseURL}}/index.php?m=user&c=Users&a=logout&referurl=https://interact.sh'
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'# digest: 4a0a0047304502210096ad0c997fe2ab1565344289298ece91f380870487ab79b76a275408a93c9aff0220323419c9952c4d6d2f50769606f239ee235ab2ce939149874eb60c867a3f0428:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-39501.yaml"