Labstack Echo 4.8.0 - Open Redirect
ID: CVE-2022-40083
Severity: critical
Author: pdteam
Tags: cve,cve2022,redirect,labstack
Description
Section titled “Description”Labstack Echo 4.8.0 contains an open redirect vulnerability via the Static Handler component. An attacker can leverage this vulnerability to cause server-side request forgery, making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2022-40083
info: name: Labstack Echo 4.8.0 - Open Redirect author: pdteam severity: critical description: | Labstack Echo 4.8.0 contains an open redirect vulnerability via the Static Handler component. An attacker can leverage this vulnerability to cause server-side request forgery, making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | Successful exploitation of this vulnerability could lead to phishing attacks, credential theft,. remediation: Download and install 4.9.0, which contains a patch for this issue. reference: - https://github.com/labstack/echo/issues/2259 - https://nvd.nist.gov/vuln/detail/CVE-2022-40083 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Henry4E36/POCS classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H cvss-score: 9.6 cve-id: CVE-2022-40083 cwe-id: CWE-601 epss-score: 0.02362 epss-percentile: 0.89807 cpe: cpe:2.3:a:labstack:echo:4.8.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: labstack product: echo tags: cve,cve2022,redirect,labstack
http: - method: GET path: - "{{BaseURL}}//interactsh.com%2f.."
matchers-condition: and matchers: - type: regex part: location regex: - '^\s*//interactsh.com/\.\.'
- type: status status: - 301# digest: 490a00463044022068cf0b79914bd12344594b2becb86fe4dab953d86d840c60a7c7af9035a46c3c02202ef6a08e8fecb7af806a5ba0aa7cfbdab2c620a5b0b596923d2c40df9dbf0314:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-40083.yaml"