Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22873 PoC — Revive Adserver 输入验证错误漏洞

Source
Associated Vulnerability
Title:Revive Adserver 输入验证错误漏洞 (CVE-2021-22873)
Description:Revive Adserver是Revive Adserver团队的一套开源的广告管理系统。该系统提供广告投放、广告位管理、数据统计等功能。 Revive Adserver 5.1.0 之前版本存在输入验证错误漏洞,该漏洞源于第三方点击跟踪的重定向不可选择。
Description
A PoC exploit for CVE-2021-22873 - Revive Adserver Open Redirect Vulnerability.
Readme
# CVE-2021-22873 - Revive Adserver Open Redirect Vulnerability

Revive Adserver before version 5.1.0 is vulnerable to open redirects via the dest, oadest, and/or ct0 parameters of the lg.php and ck.php delivery scripts. Originally, this functionality was designed to allow third-party ad servers to track metrics when delivering ads. However, due to security concerns, third-party click tracking via redirects is no longer considered a viable option, leading to the removal of this feature and its reclassification as a security vulnerability.

# Impact

The open redirect vulnerability in Revive Adserver could allow attackers to craft malicious URLs that redirect users to arbitrary websites. This could potentially be abused for phishing attacks, distributing malware, or tricking users into visiting malicious websites.

# PoC Exploit

GET /lg.php?dest=https://malicious-website.com HTTP/1.1
Host: example.com

# Steps to Reproduce

    Deploy Revive Adserver version before 5.1.0.
    Craft a malicious URL with the dest, oadest, or ct0 parameters pointing to a malicious website.
    Deliver the malicious URL as part of an ad.
    When a user clicks on the ad, they will be redirected to the malicious website.

# Disclaimer

This proof of concept is for educational purposes only. Use it responsibly and only on systems you have permission to test. The author is not responsible for any misuse or damage caused.
File Snapshot

[4.0K] /data/pocs/4a52ae1bda043090ddd2aeba48ff4ddd627af3f2 ├── [ 297] CVE-2021-22873.sh └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.