
CVE-2020-11515 Scanner
CVE-2020-11515 Scanner - Open Redirect vulnerability in Rank Math SEO
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
3 weeks 19 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Rank Math SEO is a popular plugin used in WordPress websites to enhance SEO performance and manage SEO-related settings. It is commonly employed by webmasters and online marketers to improve the visibility of their websites in search engine results. The plugin offers features such as keyword optimization, sitemap creation, and integration with Google Search Console. It's an essential tool for website owners operating on the WordPress platform, helping them achieve higher search rankings and better control over SEO aspects. With a large user base, Rank Math SEO plays a critical role in on-page SEO management for both personal blogs and professional websites.
The vulnerability detected in Rank Math SEO involves the exploitation of an unprotected REST API endpoint. This vulnerability allows unauthenticated attackers to create redirects to arbitrary external websites, which can compromise the site's integrity. An attacker can generate new URIs that redirect users away from legitimate site content, posing security risks. Unlike typical open redirect issues, this flaw involves creating a new URI rather than altering an existing one. The flaw affects all versions of the plugin up to version 1.0.40.2, making several sites using this plugin susceptible to exploits. The CVE-2020-11515 identifier has been assigned to this vulnerability.
Technical details about this vulnerability involve the 'rankmath/v1/updateRedirection' REST API endpoint. This endpoint lacks proper authentication checks, allowing unauthenticated users to craft POST requests that define new redirection rules. When exploited, the request execution leads to the creation of new URIs that could redirect users to malicious or deceptive websites. The vulnerability arises from improper API security handling, requiring immediate attention and updates to safeguard affected sites. The vulnerable parameter within the JSON format structure includes the 'redirectionUrl' and 'redirectionSources', indicating the target and source points in the redirection process.
When this vulnerability is exploited by malicious entities, several adverse effects may ensue. Users could be redirected to malicious websites, leading to potential phishing attacks or malware distribution. It threatens user trust and could result in financial or informational losses for the affected sites. Furthermore, exploitation of this vulnerability can undermine the site's SEO efforts by imposing unwanted redirects. If left unaddressed, website operators might find themselves listed in blacklists or suffer penalties from search engines like Google. This vulnerability presents a severe security misconfiguration risk mandating prompt action from affected parties.
REFERENCES