| タイトル | PHPGurukul COVID-19 Testing Management System 2021 version Open Redirection |
|---|
| 説明 | The search-report-result.php endpoint of the COVID-19 Testing Management System is vulnerable to open redirection. The application accepts a user-supplied URL parameter and redirects users without proper validation. This allows attackers to craft malicious URLs that redirect victims to external, potentially malicious websites.
Affected Endpoint:
/search-report-result.php?q=https://example.com
Impact:
An attacker can:
Redirect users to phishing pages or malware-infected sites
Exploit the trust of the original domain (used in phishing attacks)
Bypass redirect-based access control or filtering mechanisms
Fix Recommendation:
Validate redirect URLs against a whitelist of allowed domains
Reject or sanitize external URLs
Use relative paths for internal redirection |
|---|
| ソース | ⚠️ https://targetsite.com/search-report-result.php |
|---|
| ユーザー | Anzil (UID 86393) |
|---|
| 送信 | 2025年06月10日 09:06 (10 月 ago) |
|---|
| モデレーション | 2025年06月19日 09:22 (9 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 313290 [PHPGurukul COVID19 Testing Management System 2021 search-report-result.php q Redirect] |
|---|
| ポイント | 17 |
|---|