.. / CVE-2020-36365

Exploit for Smartstore <4.1.0 - Open Redirect (CVE-2020-36365)

Description:

Smartstore (aka “SmartStoreNET”) before 4.1.0 contains an open redirect vulnerability via CommonController.ClearCache, ClearDatabaseCache, RestartApplication, and ScheduleTaskController.Edit. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

Nuclei Template

View the template here CVE-2020-36365.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-36365.yaml
Copy

References:

https://github.com/smartstore/SmartStoreNET
https://github.com/ARPSyndicate/cvemon
https://github.com/smartstore/SmartStoreNET/issues/2113
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2020-36365