2021-03-24 17:46:18 +00:00
|
|
|
id: header-command-injection
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Header Command Injection
|
|
|
|
author: geeknik
|
|
|
|
severity: high
|
2021-03-24 17:50:20 +00:00
|
|
|
description: Fuzzing headers for command injection
|
2021-04-02 13:54:37 +00:00
|
|
|
tags: fuzz,rce
|
2021-03-24 17:46:18 +00:00
|
|
|
|
|
|
|
requests:
|
|
|
|
- payloads:
|
2021-03-24 17:55:19 +00:00
|
|
|
header: helpers/payloads/request-headers.txt
|
|
|
|
payload: helpers/payloads/command-injection.txt
|
2021-03-24 17:46:18 +00:00
|
|
|
|
|
|
|
raw:
|
|
|
|
- |
|
|
|
|
GET /?§header§ HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
|
|
|
|
§header§: §payload§
|
|
|
|
Connection: close
|
|
|
|
|
|
|
|
attack: clusterbomb
|
|
|
|
redirects: true
|
|
|
|
matchers-condition: or
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "uid="
|
|
|
|
- "gid="
|
|
|
|
- "groups="
|
|
|
|
condition: and
|
|
|
|
|
|
|
|
- type: regex
|
|
|
|
regex:
|
|
|
|
- "root:[x*]:0:0:"
|