nuclei-templates/miscellaneous/unpatched-coldfusion.yaml

34 lines
989 B
YAML
Raw Normal View History

2021-04-01 07:37:58 +00:00
id: unpatched-coldfusion
info:
name: Adobe ColdFusion - Improper Input Validation - Arbitrary Code Execution
author: Daviey
2021-04-01 07:37:58 +00:00
severity: info
reference:
- https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html
- https://twitter.com/Daviey/status/1374070630283415558
2021-04-01 18:35:08 +00:00
tags: rce,adobe,misc
requests:
- method: GET
path:
- "{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- 'eval\(\"\(\"\+json\+\"\)\"\)'
- type: status
status:
- 200