-
Notifications
You must be signed in to change notification settings - Fork 3
/
CVE-2023-3519.yaml
57 lines (57 loc) · 1.4 KB
/
CVE-2023-3519.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
id: cve-2023-3519
info:
name: CVE-2023-3519 Vulnerability Check
author: Dhiraj Mishra (@RandomDhiraj)
severity: high
description: |
Checks target for CVE-2023-3519 vulnerability.
Compares "Last-Modified" header in the server response to known patched versions.
references:
- https://nvd.nist.gov/vuln/detail/CVE-2023-3519
- https://twitter.com/DTCERT/status/1682032701430452233
tags:
- safe
- vuln
requests:
- method: GET
path: /
port: ssl
matchers:
- type: word
words:
- "Patched version detected"
- type: not
words:
- "Potentially vulnerable"
headers:
User-Agent: nuclei-templates
Connection: close
Accept-Encoding: gzip, deflate
Accept: "*/*"
tests:
- type: status
status:
- 200
- type: word
words:
- "Last-Modified"
- type: regex
regex:
- 'Last-Modified:\s*(.*)'
matchers:
- type: group
index: 1
extractors:
- type: text
regex:
- '.*'
group: 0
match: patched
- type: metadata
requirements:
- patched
operators:
- type: compare
operator: contains
value:
- "Patched version detected"