Analytics Insights for Google Analytics 4 < 6.3 - Open Redirect
ID: CVE-2024-0250
Severity: medium
Author: s4e-io
Tags: cve,cve2024,wpscan,redirect,wp,wp-plugin,wordpress,analytics-insights
Description
Section titled “Description”The plugin is vulnerable to Open Redirect due to insufficient validation on the redirect oauth2callback.php file. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
YAML Source
Section titled “YAML Source”id: CVE-2024-0250
info: name: Analytics Insights for Google Analytics 4 < 6.3 - Open Redirect author: s4e-io severity: medium description: | The plugin is vulnerable to Open Redirect due to insufficient validation on the redirect oauth2callback.php file. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action. remediation: | Fixed in 6.3 reference: - https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/ - https://github.com/fkie-cad/nvd-json-data-feeds - https://nvd.nist.gov/vuln/detail/CVE-2024-0250 classification: epss-score: 0.00043 epss-percentile: 0.0866 metadata: max-request: 1 verified: true fofa-query: body="/wp-content/plugins/analytics-insights" publicwww-query: "/wp-content/plugins/analytics-insights" tags: cve,cve2024,wpscan,redirect,wp,wp-plugin,wordpress,analytics-insights
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/analytics-insights/tools/oauth2callback.php?state=https://oast.me/%3f&code=x"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$'# digest: 490a0046304402203c489f7c519da6b618fee56bcde8cab24fe22a36fd7c2a938a00909181deefeb02202f0dfab66612e03b93e59ab692b3f75cd8afca5d86a8bc6d776c491ce6b14faf:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-0250.yaml"