Update CVE-2020-12800.yaml
parent
50bdba06b1
commit
0154c517ac
|
@ -4,7 +4,8 @@ info:
|
|||
name: WordPress Contact Form 7 <1.3.3.3 - Remote Code Execution
|
||||
author: dwisiswant0
|
||||
severity: critical
|
||||
description: WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file.
|
||||
description: |
|
||||
WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file.
|
||||
reference:
|
||||
- https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-contact-form-7/#developers
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-12800
|
||||
|
@ -13,7 +14,7 @@ info:
|
|||
cvss-score: 9.8
|
||||
cve-id: CVE-2020-12800
|
||||
cwe-id: CWE-434
|
||||
tags: cve,cve2020,wordpress,wp-plugin,upload
|
||||
tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -53,13 +54,12 @@ requests:
|
|||
req-condition: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
part: body_2
|
||||
words:
|
||||
- "CVE-2020-12800-{{randstr}}"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# Enhanced by mp on 2022/05/16
|
||||
|
|
Loading…
Reference in New Issue