Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22873 PoC — Revive Adserver 输入验证错误漏洞

Source
Associated Vulnerability
Title:Revive Adserver 输入验证错误漏洞 (CVE-2021-22873)
Description:Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability.
Description
A PoC exploit for CVE-2021-22873 - Revive Adserver Open Redirect Vulnerability.
Readme
# CVE-2021-22873 - Revive Adserver Open Redirect Vulnerability

Revive Adserver before version 5.1.0 is vulnerable to open redirects via the dest, oadest, and/or ct0 parameters of the lg.php and ck.php delivery scripts. Originally, this functionality was designed to allow third-party ad servers to track metrics when delivering ads. However, due to security concerns, third-party click tracking via redirects is no longer considered a viable option, leading to the removal of this feature and its reclassification as a security vulnerability.

# Impact

The open redirect vulnerability in Revive Adserver could allow attackers to craft malicious URLs that redirect users to arbitrary websites. This could potentially be abused for phishing attacks, distributing malware, or tricking users into visiting malicious websites.

# PoC Exploit

GET /lg.php?dest=https://malicious-website.com HTTP/1.1
Host: example.com

# Steps to Reproduce

    Deploy Revive Adserver version before 5.1.0.
    Craft a malicious URL with the dest, oadest, or ct0 parameters pointing to a malicious website.
    Deliver the malicious URL as part of an ad.
    When a user clicks on the ad, they will be redirected to the malicious website.

# Disclaimer

This proof of concept is for educational purposes only. Use it responsibly and only on systems you have permission to test. The author is not responsible for any misuse or damage caused.
File Snapshot

[4.0K] /data/pocs/4a52ae1bda043090ddd2aeba48ff4ddd627af3f2 ├── [ 297] CVE-2021-22873.sh └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →