Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Netsweeper 4.0.9 - Open Redirect

By kannthu

Medium
Vidoc logoVidoc Module
#netsweeper#redirect#packetstorm
Description

Netsweeper 4.0.9 - Open Redirect

What is the "Netsweeper 4.0.9 - Open Redirect?"

The "Netsweeper 4.0.9 - Open Redirect" module is designed to detect an open redirect vulnerability in Netsweeper 4.0.9. Netsweeper is a software used for web content filtering and security. This vulnerability allows an attacker to redirect a user to a malicious website, potentially leading to the disclosure of sensitive information, data modification, or other unauthorized actions. The severity of this vulnerability is classified as medium.

Impact

An open redirect vulnerability in Netsweeper 4.0.9 can have several potential impacts:

- Disclosure of sensitive information - Data modification - Unauthorized actions

How does the module work?

The "Netsweeper 4.0.9 - Open Redirect" module works by sending HTTP requests to the target system and checking for specific conditions that indicate the presence of the open redirect vulnerability. The module uses a matching condition that checks the response header for a redirect location that matches a specific regex pattern. If the condition is met, the module reports the vulnerability.

Here is an example of an HTTP request used by the module:

GET /webadmin/authportal/bounce.php?url=https://interact.sh/

The module's matching condition checks the response header for a location header that matches the regex pattern:

(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\\-_.@]*)interact\\.sh.*$

If the regex pattern matches the location header, the module identifies the open redirect vulnerability in Netsweeper 4.0.9.

Author: daffainfo

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/webadmin/authportal...
Matching conditions
regex: (?m)^(?:Location\s*?:\s*?)(?:https?://|/...
Passive global matcher
No matching conditions.
On match action
Report vulnerability