CVE-2023-5375 Scanner
Detects 'Open Redirect' vulnerability in Mosparo affects prior to v. 1.0.2.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
URL
Toolbox
-
Mosparo/Mosparo is a GitHub repository used for building advanced web crawlers that are designed to work with popular websites and marketplaces, such as Amazon or LinkedIn. Developed by mosparo, this repository aims to aid online businesses with gathering data from different sources. Mosparo/Mosparo provides several libraries and modules for ease of use and convenience.
Recently, a vulnerability was detected in Mosparo/Mosparo prior to version 1.0.2, with the CVE-2023-5375 vulnerability code. This vulnerability is a type of open redirect that allows an attacker to redirect a user to a malicious website or page using a crafted URL. Open redirects are a widely known vulnerability and are commonly exploited by attackers to steal sensitive information or distribute malware.
When this vulnerability is exploited, attackers can trick users into visiting a fake website or page that appears legitimate. They can then steal sensitive information that users input on the page, such as login credentials or financial information. In addition, attackers can also use the redirection to spread malware or conduct phishing attacks.
Thanks to the pro features of the s4e.io platform, readers of this article can easily and quickly learn about vulnerabilities in their digital assets. s4e.io provides users with comprehensive vulnerability assessment and management solutions that enable businesses to stay ahead of cyber risks and protect their assets from attacks. With these features, businesses can keep their data safe from vulnerabilities like the one found in Mosparo/Mosparo.
REFERENCES
- https://github.com/mosparo/mosparo/commit/9d5da367b78b8c883bfef5f332ffea26292f99e8
- https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9