Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-2621 PoC — Telaen 输入验证错误漏洞

Source
Associated Vulnerability
Title:Telaen 输入验证错误漏洞 (CVE-2013-2621)
Description:Telaen是一个由PHP开发基于Web的电子邮件客户端。该客户端运行在任何支持PHP的Email服务器下,不需要数据库支持,兼容POP3和IMAP协议。 Telaen 1.3.1之前版本中的redir.php脚本存在输入验证错误漏洞。攻击者可借助特制URL利用该漏洞将用户重定向到任意网站。
Description
Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL.
File Snapshot

id: CVE-2013-2621 info: name: Telaen => v1.3.1 - Open Redirect author: ctflearner severity: m ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.