I need an example of what a valid PoC is for bounty #14916
Replies: 2 comments
-
|
Here's a concrete example of what a valid PoC (Proof of Concept) looks like for a nuclei template bounty submission vs a "mock" one: Valid PoC ExampleA valid PoC demonstrates that the template actually detects a real vulnerability on a live (or lab) target. You need:
Example: CVE-2023-22515 (Atlassian Confluence Auth Bypass)Template ( id: CVE-2023-22515
info:
name: Atlassian Confluence - Authentication Bypass
author: your-username
severity: critical
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-22515
http:
- method: GET
path:
- "{{BaseURL}}/server-info.action"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Server Information"
- "Confluence"
condition: and
- type: status
status:
- 200PoC Evidence (run output): $ nuclei -t CVE-2023-22515.yaml -u https://vulnerable-target.example.com -v
[CVE-2023-22515] [http] [critical] https://vulnerable-target.example.com/server-info.actionWhat makes this valid:
What a "Mock" / Invalid PoC Looks LikeThese will get rejected:
How to Create a Valid PoC
Bounty Submission FormatThis shows the reviewer that the template actually works against a real vulnerable instance. |
Beta Was this translation helpful? Give feedback.
-
|
Here's a concrete example of what a valid PoC (Proof of Concept) looks like for a nuclei template bounty submission vs a "mock" one: Valid PoC ExampleA valid PoC demonstrates that the template actually detects a real vulnerability on a live (or lab) target. You need:
Example: CVE-2023-22515 (Atlassian Confluence Auth Bypass)Template ( id: CVE-2023-22515
info:
name: Atlassian Confluence - Authentication Bypass
author: your-username
severity: critical
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-22515
http:
- method: GET
path:
- "{{BaseURL}}/server-info.action"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Server Information"
- "Confluence"
condition: and
- type: status
status:
- 200PoC Evidence (run output): $ nuclei -t CVE-2023-22515.yaml -u https://vulnerable-target.example.com -v
[CVE-2023-22515] [http] [critical] https://vulnerable-target.example.com/server-info.actionWhat makes this valid:
What a "Mock" / Invalid PoC Looks LikeThese will get rejected:
How to Create a Valid PoC
Bounty Submission FormatThis shows the reviewer that the template actually works against a real vulnerable instance. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Just need an example of this. That's all. Cu I don't understand what is valid and what is "mock"
Beta Was this translation helpful? Give feedback.
All reactions