header-command-injection: Header - Remote Command Injection

日期: 2025-08-01 | 影响软件: | POC: 已公开

漏洞描述

Headers were tested for remote command injection vulnerabilities.

PoC代码[已公开]

id: header-command-injection

info:
  name: Header - Remote Command Injection
  author: geeknik
  severity: critical
  description: Headers were tested for remote command injection vulnerabilities.
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 7650
  tags: fuzz,rce,fuzzing,vuln

http:
  - raw:
      - |
        GET /?{{header}} HTTP/1.1
        Host: {{Hostname}}
        {{header}}: {{payload}}

    payloads:
      header: helpers/payloads/request-headers.txt
      payload: helpers/payloads/command-injection.txt
    attack: clusterbomb
    host-redirects: true
    stop-at-first-match: true

    matchers-condition: or
    matchers:
      - type: word
        words:
          - "uid="
          - "gid="
          - "groups="
        condition: and

      - type: regex
        regex:
          - "root:.*:0:0:"
# digest: 4a0a00473045022100eafec99827893ac236d9ecc25126b35fc2b206e65bbbb162a03539955f9e0f4602200e5fd3d7144526be4c439c6f3bb825fc47b2813210ad6c250f1defab93580c13:922c64590222798bb761d5b6d8e72950

相关漏洞推荐