Replies: 10 comments
-
Hi @iiiusky, Thanks for sharing this idea, just wanted to dig more into this, how this is different from existing payload support? for example have a look at this template where you can define a variable and call in the request section - |
Beta Was this translation helpful? Give feedback.
-
Hi @ehsandeep , Similar to the following:
|
Beta Was this translation helpful? Give feedback.
-
Okay now I get it, so you are looking to add support for taking variable input via CLI at run time? |
Beta Was this translation helpful? Give feedback.
-
Yes, so you can make more use in the poc. |
Beta Was this translation helpful? Give feedback.
-
In fact, in normal mode, use the built-in default value, and in exploit mode, use the value entered in the console |
Beta Was this translation helpful? Give feedback.
-
Got it, this should be already supported in - #641 and will be available to use as soon as we finalize the implementation and merge it into the branch. |
Beta Was this translation helpful? Give feedback.
-
This method seems to require the user to manually specify a variable similar to this format, right? key=value, this is a way, but the more troublesome thing is that you have to manually open the yaml file every time to view its variables. I think interactive input is better under certain circumstances, but if it is in batch automation mode, it is really not Too friendly. |
Beta Was this translation helpful? Give feedback.
-
@iiiusky I mean say, the above PR will allow us to feed variable value with user input in CLI and does not require editing template file, it's WIP. |
Beta Was this translation helpful? Give feedback.
-
The source code of github.com/projectdiscovery/starlight is not open yet, right? I may not be able to express it clearly. What I want to express is that if you run a poc plug-in separately, you can interactively let users enter the values of different variables. In this case, the user does not need to open yaml to see what is available. Variables, in the interaction, will loop all the extracted variable lists, because they are of map[string]interface{} type |
Beta Was this translation helpful? Give feedback.
-
I have got a malwarebyte report for this file as infected in my system could please explain this @iiiusky @ehsandeep @xstevens |
Beta Was this translation helpful? Give feedback.
-
Is your feature request related to a problem? Please describe.
I want to add a new exploit mode
Describe the solution you'd like
The verified vulnerabilities can be extended to make them more widely used in more situations
Can you join exp mode:
The conceptual verification warehouse is here (
except CVE-2017-12615.yaml, I will list it separately
)https://github.com/iiiusky/nuclei/tree/exp-concept
I changed the following files:
The content of the changed file is as follows:
iiiusky@a4f86d2
CVE-2017-12615.yaml file content
Beta Was this translation helpful? Give feedback.
All reactions