2023-05-17 19:03:29 +00:00
|
|
|
id: symfony-fragment
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Symfony _fragment - Detect
|
2023-05-31 03:39:58 +00:00
|
|
|
author: Palanichamy_perumal,TechbrunchFR
|
2023-05-17 19:03:29 +00:00
|
|
|
severity: unknown
|
|
|
|
description: |
|
2023-05-30 10:05:10 +00:00
|
|
|
Symfony servers support a "/_fragment" command that allows clients to provide custom PHP commands and return the HTML output.
|
2023-05-17 19:03:29 +00:00
|
|
|
reference: |
|
|
|
|
- https://portswigger.net/daily-swig/symfony-based-websites-open-to-rce-attack-research-finds
|
|
|
|
- https://medium.com/@m4cddr/how-i-got-rce-in-10-websites-26dd87441f22
|
|
|
|
- https://al1z4deh.medium.com/how-i-hacked-28-sites-at-once-rce-5458211048d5
|
|
|
|
- https://github.com/ambionics/symfony-exploits
|
|
|
|
metadata:
|
2023-06-08 18:12:39 +00:00
|
|
|
verified: true
|
2023-05-17 19:03:29 +00:00
|
|
|
shodan-query: http.html:"symfony Profiler"
|
|
|
|
tags: config,exposure,symfony
|
|
|
|
|
2023-05-30 10:05:10 +00:00
|
|
|
requests:
|
2023-05-17 19:03:29 +00:00
|
|
|
- method: GET
|
|
|
|
path:
|
|
|
|
- '{{BaseURL}}/_fragment'
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
2023-05-30 10:05:10 +00:00
|
|
|
- type: dsl
|
|
|
|
dsl:
|
|
|
|
- "status_code == 403"
|
|
|
|
- "contains(body, 'Symfony') || contains(body, '403 Forbidden')"
|
|
|
|
- "(\"8b2f83102bc96e5068d36df80301a64d\" == md5(body)) || (\"4df206fbc337c398c3b669172934c8cb\" == md5(body))"
|
|
|
|
condition: and
|