Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-24550

EPSS 65.89% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-24550

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Elastic EpiServer Find 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Elastic EpiServer Find是 (Elastic)开源的一个应用程序。一个搜索引擎,使开发人员能够在网站,Intranet以及几乎任何类型的具有文本内容的系统上构建出色的搜索体验。 EpiServer Find before 13.2.7 存在安全漏洞,攻击者可利用该漏洞通过精心制作的URL中的t重定向参数将用户重定向到不受信任的网站。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-24550

#POC DescriptionSource LinkShenlong Link
1EpiServer Find before 13.2.7 contains an open redirect vulnerability via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-24550.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-24550

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-03-31 · 45 CVEs total

CVE-2021-233486.3 MEDIUMArbitrary Command Injection
CVE-2021-22986F5 BIG-IP 代码问题漏洞
CVE-2021-21776Accusoft ImageGear 缓冲区错误漏洞
CVE-2021-21782Accusoft ImageGear 缓冲区错误漏洞
CVE-2021-21773Accusoft ImageGear 代码问题漏洞
CVE-2020-28173Sourcecodester Simple College Website 代码问题漏洞
CVE-2020-28172Sourcecodester Simple College Website SQL注入漏洞
CVE-2021-3477LIM OpenEXR 输入验证错误漏洞
CVE-2021-3478LIM OpenEXR 资源管理错误漏洞
CVE-2021-3479LIM OpenEXR 资源管理错误漏洞
CVE-2021-28245PbootCMS SQL注入漏洞
CVE-2021-22988F5 BIG-IP 跨站脚本漏洞
CVE-2021-22987F5 BIG-IP 安全漏洞
CVE-2021-22990F5 BIG-IP 安全漏洞
CVE-2021-22995F5 BIG-IP 访问控制错误漏洞
CVE-2021-22992F5 BIG-IP 安全漏洞
CVE-2021-22989F5 BIG-IP 安全漏洞
CVE-2021-29658vscode-rufo 安全漏洞
CVE-2021-22991F5 BIG-IP 缓冲区错误漏洞
CVE-2021-22994F5 BIG-IP 跨站脚本漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-24550

No comments yet


Leave a comment