projectdiscovery / nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.

Home Page:https://github.com/projectdiscovery/nuclei

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Templates of network type cannot accept the expected response in Windows OS

Jackey0 opened this issue · comments

Nuclei Version: 2.6.9

Template file: CVE-2020-1938.yaml

Command to reproduce: nuclei -t D:\nuclei-templates-master\cves\2020\CVE-2020-1938.yaml -u http://< redacted >:8009

On the Window machine, I detect that this vulnerability does not exist, but it does exist. On Linux, four out of five probes will result in a vulnerability and one will result in no vulnerability. I don't know why.

@Jackey0, Thank you so much for creating this issue. Could you please share the debug data using the -debug flag while running on a Windows and Linux machine? It may be an issue specific to the host.

in windows: the response results are incomplete, but I use Wireshark to capture packets and can see the complete packet
debug_windows

in linux:
debug_linux

It's poc problem

Hi @Jackey0, CVE-2020-1938 working fine with windows host and it's verified.
Reason: sometimes remote machines/service returning invalid response.

screenshot from actual python exploit.
image

Tested on Nuclei Engine Version: v2.9.4

image

Hello @Jackey0 , I am closing this issue now. If you are still experiencing the same problem, please feel free to reopen it. 🚀