Discovered by: letm3through (Ahn TaeGyu)
There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the url parameter in login path.
-
Vulnerability Type: CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
-
CVE Impact Other: Phishing via URL Redirection to Untrusted Site ('Open Redirect')
-
Attack Type: Remote
- Name of affected Product: gnuboard 6
- Affected version: =< 6.0.4
- Affected Product Code Base: Gnuboard version 6.0.4 and below are affected - Fixed in version 6.0.5
- Component: Login Path of Gnuboard 6
- Affected source code: dependencies.py
- Issue provided with fix PR: gnuboard/g6#582
url parameter is vulnerable to open redirect despite having a filter logic.
The filter logic can be easily bypassed with double slashes // as below PoC.
PoC:
http://[DOMAIN]/bbs/login?url=//example.com