diff --git a/cves/2021/CVE-2021-30134.yaml b/cves/2021/CVE-2021-30134.yaml
index 6ca81d1206..ce08a5c748 100644
--- a/cves/2021/CVE-2021-30134.yaml
+++ b/cves/2021/CVE-2021-30134.yaml
@@ -1,7 +1,7 @@
id: CVE-2021-30134
info:
- name: php-mod/curl Library - Unauthenticated Reflected Cross-Site Scripting (XSS)
+ name: php-mod/curl Library - Cross-Site Scripting
author: theamanrawat
severity: medium
description: |
@@ -10,24 +10,28 @@ info:
- https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7
- https://nvd.nist.gov/vuln/detail/CVE-2021-30134
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
cve-id: CVE-2021-30134
- cwe-id: CWE-79
metadata:
verified: "true"
- tags: cve,cve2021,xss,php-mod,unauth
+ google-query: inurl:"/php-curl-test/post_file_path_upload.php"
+ tags: cve,cve2021,xss,php-mod
requests:
- - raw:
- - |
- GET /vendor/curl/curl/tests/server/php-curl-test/post_file_path_upload.php?key= HTTP/1.1
- Host: {{Hostname}}
+ - method: GET
+ path:
+ - "{{BaseURL}}/vendor/curl/curl/tests/server/php-curl-test/post_file_path_upload.php?key="
+ matchers-condition: and
matchers:
- - type: dsl
- dsl:
- - 'status_code == 200'
- - 'contains(content_type, "text/html")'
- - 'contains(body, "{\"request_method\":\"GET\",\"key\":\"\"")'
- condition: and
\ No newline at end of file
+ - type: word
+ words:
+ - 'key":""'
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200