Skip to content

[FALSE-POSITIVE] CVE-2024-4439 #11496

@KristinnVikar

Description

@KristinnVikar

Template IDs or paths

- http/cves/2024/CVE-2024-4439.yaml

Environment

- OS: Ubuntu 22.04
- Nuclei: Any
- Go:

Steps To Reproduce

Since default matcher condition is OR 1, any webserver that responds HTTP 200 for the request POST /wp-login.php (or respond HTTP 200 to any of the other 8 requests) will match against the template, since it blindly matches against HTTP 200.

- type: status
status:
- 200

Relevant dumped responses

Anything else?

No response

Footnotes

  1. https://docs.projectdiscovery.io/templates/reference/matchers#matchers-condition

Metadata

Metadata

Assignees

Labels

DoneReady to mergefalse-positiveNuclei template reporting invalid/unexpected result

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions