From 5e844c925f211e669973937a112c0efea81cf0a9 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 12 Dec 2020 19:45:59 +0000 Subject: [PATCH] Delete CVE-2019-11043.yaml This is the incorrect way to test for this particular bug. The person who pointed this out has no desire to open a pull request. So we nuke this file. --- cves/CVE-2019-11043.yaml | 20 -------------------- 1 file changed, 20 deletions(-) delete mode 100644 cves/CVE-2019-11043.yaml diff --git a/cves/CVE-2019-11043.yaml b/cves/CVE-2019-11043.yaml deleted file mode 100644 index 68e2b26a28..0000000000 --- a/cves/CVE-2019-11043.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: cve-2019-11043 - -info: - name: PHP-FPM & nginx RCE - author: geeknik - severity: high - description: Certain versions of PHP 7 running on NGINX with php-fpm enabled can be vulnerable to remote code execution. - reference: https://github.com/neex/phuip-fpizdam - # This tempalte needs to reworked, WIP. - -requests: - - method: GET - path: - - "{{BaseURL}}/?a=/bin/sh+-c+'which+which'&" - - matchers: - - type: word - words: - - "/bin/which" - part: body