nuclei-templates/http/vulnerabilities/apache/shiro/shiro-deserialization-detec...

45 lines
1.6 KiB
YAML
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

id: shiro-deserialization-detection
info:
name: Shiro <= 1.2.4 Deserialization Detection
author: hotpot,j4vaovo
severity: unknown
description: |
This template is designed to detect the Shiro framework's default key vulnerabilities. It leverages 51 built-in Shiro keys to probe for potential vulnerabilities.
reference:
- https://github.com/sv3nbeast/ShiroScan
metadata:
max-request: 102
tags: shiro,deserialization,rce,apache
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
Cookie: JSESSIONID={{randstr}};rememberMe=123;
- |
GET / HTTP/1.1
Host: {{Hostname}}
Cookie: JSESSIONID={{randstr}};rememberMe={{key}};
payloads:
key: helpers/wordlists/shiro_encrypted_keys.txt
stop-at-first-match: true
matchers-condition: and
matchers:
- type: dsl # WAF Block Page
dsl:
- 'contains(header_1, "Set-Cookie") && (contains(header_1, "rememberMe=") || contains(header_1, "=deleteMe"))'
- '!contains(header_2, "rememberMe=") && !contains(header_2, "=deleteMe")'
condition: and
- type: dsl
dsl:
- '!contains(body_2, "<p>当前访问疑似黑客攻击,已被网站管理员设置拦截并记录</p>")'
- '!contains(body_2, "很抱歉由于您访问的URL有可能对网站造成安全威胁您的访问被阻断")'
condition: and
# digest: 4a0a00473045022100d31e9314ce77be5a00ae9fa4bb30686fef3506b2d8008154e0ac30c99c7ba0f502201170dc3d229d2e3770bd9b734ce65414d1ef189b2518dec525a60f636a17e152:922c64590222798bb761d5b6d8e72950