Update and rename vulnerabilities/struts-dev-mode-ognl-injection.yaml to vulnerabilities/backdoor/struts2-ognl-backdoor.yaml
parent
19a0804d6c
commit
dcc602cc19
|
@ -1,4 +1,4 @@
|
||||||
id: struts-dev-mode-ognl-injection
|
id: struts2-ognl-backdoor
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Struts Dev Mode OGNL Injection
|
name: Apache Struts Dev Mode OGNL Injection
|
||||||
|
@ -10,18 +10,23 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: html:"Struts Problem Report"
|
shodan-query: html:"Struts Problem Report"
|
||||||
tags: apache,struts,ognl,misconfig
|
tags: apache,struts,ognl,misconfig,injection
|
||||||
|
|
||||||
|
variables:
|
||||||
|
first: "{{rand_int(1000, 9999)}}"
|
||||||
|
second: "{{rand_int(1000, 9999)}}"
|
||||||
|
result: "{{to_number(first)*to_number(second)}}"
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- '{{BaseURL}}/portal/displayAPSForm.action?debug=command&expression={{7*7}}'
|
- '{{BaseURL}}/portal/displayAPSForm.action?debug=command&expression={{first}}*{{second}}'
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- '[[49]]'
|
- '{{result}}'
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
Loading…
Reference in New Issue