Nettacker/nettacker/modules/vuln/exponent_cms_cve_2021_38751...

48 lines
1.4 KiB
YAML

info:
name: exponent_cms_cve_2021_38751_vuln
author: OWASP Nettacker Team
severity: 5
description: A HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.
reference:
- https://github.com/exponentcms/exponent-cms/issues/1544
- https://github.com/exponentcms/exponent-cms/blob/a9fa9358c5e8dc2ce7ad61d7d5bea38505b8515c/exponent_constants.php#L56-L64
profiles:
- vuln
- http
- medium_severity
- cve
- exponent_cms
- cve2021
payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
Host: "random_string_1.com"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: "200"
reverse: false
content:
regex: "random_string_1.com"
reverse: false