From 50f5c91edf48484ef585476b8c766c7bae385b37 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 26 Feb 2021 09:02:50 +0000 Subject: [PATCH] Create hashicorp-consul-rce.yaml --- .../other/hashicorp-consul-rce.yaml | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/other/hashicorp-consul-rce.yaml diff --git a/vulnerabilities/other/hashicorp-consul-rce.yaml b/vulnerabilities/other/hashicorp-consul-rce.yaml new file mode 100644 index 0000000000..918deb44ae --- /dev/null +++ b/vulnerabilities/other/hashicorp-consul-rce.yaml @@ -0,0 +1,30 @@ +id: hashicorp-consul-rce + +info: + name: Hashicorp Consul Services Api RCE + author: pikpikcu + severity: critical + reference: https://www.exploit-db.com/exploits/46074 + +requests: + - method: GET + path: + - "{{BaseURL}}/v1/agent/self" + + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: application/json" + part: header + + - type: word + words: + - '"EnableScriptChecks":' + - '"EnableRemoteScriptChecks":' + part: body + + - type: status + status: + - 200