Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-0748 PoC — BTCPay Server 输入验证错误漏洞

Source
Associated Vulnerability
Title:BTCPay Server 输入验证错误漏洞 (CVE-2023-0748)
Description:BTCPay Server是一个自托管的开源加密货币支付处理器。它是安全的,私有的,不受审查的且免费的。 BTCPay Server 1.7.6之前版本存在输入验证错误漏洞,该漏洞源于开放重定向。
Description
BTCPayServer version 1.7.5 and below is vulnerable for Open Redirection attack.
Readme
# CVE-2023-0748
BTCPayServer 1.7.5 and lower version is vulnerable for Open Redirection attack.

<strong>Step to Reproduce</strong>

1. Login your account on 

https://mainnet.demo.btcpayserver.org/login

2. Then Click the link below

https://mainnet.demo.btcpayserver.org/recovery-seed-backup?cryptoCode=BTC&mnemonic=above&passphrase=&isStored=false&requireConfirm=true&returnUrl=//evil.com

3. Check the `I have written down my recovery phrase and stored it in a secure location`

4. Then click `Done`

You will be redirected to evil.com



<br><br>

<h1>Credits</h1>

• Jefferson Gonzales (Gonz)<br>
• Link: https://twitter.com/gonzxph
File Snapshot

[4.0K] /data/pocs/6119173b9d57158faf5c78058e71bf727e53a647 └── [ 643] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.