nuclei-templates/fuzzing/header-command-injection.yaml

37 lines
798 B
YAML
Raw Normal View History

2021-03-24 17:46:18 +00:00
id: header-command-injection
info:
name: Header Command Injection
author: geeknik
severity: high
2021-03-24 17:50:20 +00:00
description: Fuzzing headers for command injection
2021-04-02 13:54:37 +00:00
tags: fuzz,rce
2021-03-24 17:46:18 +00:00
requests:
- payloads:
2021-03-24 17:55:19 +00:00
header: helpers/payloads/request-headers.txt
payload: helpers/payloads/command-injection.txt
2021-03-24 17:46:18 +00:00
raw:
- |
GET /?§header§ HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
§header§: §payload§
Connection: close
attack: clusterbomb
redirects: true
matchers-condition: or
matchers:
- type: word
words:
- "uid="
- "gid="
- "groups="
condition: and
- type: regex
regex:
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"