projectdiscovery / nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.
https://github.com/projectdiscovery/nuclei
MIT License
9.02k stars 2.58k forks source link

CVE-2018-11784 FP #10495

Open iuliu8899 opened 1 month ago

iuliu8899 commented 1 month ago

Nuclei Version:

Template file:

CVE-2018-11784

Command to reproduce:

request to http

GET /interact.sh HTTP/1.1
Host: www.nxxx.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5 Safari/605.1.15
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip

redirect to https

HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: https://www.nxxx.cominteract.sh
Server: Microsoft-IIS/10.0
X-Powered-By: ezEIP
X-Frame-Options: SAMEORIGIN
Date: Thu, 08 Aug 2024 06:27:24 GMT
Connection: close
Content-Length: 159

<head><title>文档已移动</title></head>
<body><h1>对象已移动</h1>可在<a HREF="https://www.nxxx.cominteract.sh">此处</a>找到该文档</body>

Anything else:

it's just a redirect from http to https.

ref: http://www.liuhaihua.cn/archives/537086.html

princechaddha commented 1 month ago

Hello, the response time for this issue was longer than usual because the team was traveling for DEFCON. The team will respond to this issue shortly. Thank you for your contribution

DhiyaneshGeek commented 2 weeks ago

HI @iuliu8899

i couldn't replicate the issue , let me know if i'm missing something

nuclei -u http://www.nxxx.com -id CVE-2018-11784 -vv -debug 

i also observed that the template is working as intended

feel free to re-open if you still face the issue

Thanks

iuliu8899 commented 2 weeks ago

Hi @DhiyaneshGeek sorry about that I hided some sensitive url information in before.

can you try again with this url ?

nuclei -u http://www.nuzarsurf.com -id CVE-2018-11784 -vv
iuliu8899 commented 2 weeks ago

btw I can't reopen this issue due to some permission limit?

DhiyaneshGeek commented 2 weeks ago

Hi @iuliu8899

i can replicate the issue , re-opening the issue

Thanks for flagging us