报错日志:
2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc
2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go
2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to
在写 Apache 2.4.49 路径遍历 (CVE-2021-41773)漏洞的脚本时,使用了/icons/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/etc/passwd payload,插件会运行失败。
报错日志: 2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc
2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go
2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to
2024/03/14 15:28:59 [WARNING] check Vulnerable failed: runtime error: invalid memory address or nil pointer dereference name: Apache 2.4.49 Path Traversal (CVE-2021-41773)