Conversation
Neo - Nuclei Template ReviewHigh: 1 Current PR state: 1 high active finding. Highlights
High (1)
Security ImpactVerification logic mismatch will cause false negatives ( 🤖 Prompt for AI AgentsHardening Notes
Comment |
| - type: dsl | ||
| dsl: | ||
| - status_code == 200 | ||
| - contains(body, "{{randstr}}") |
There was a problem hiding this comment.
🟠 Verification logic mismatch will cause false negatives — The template uploads a PHP file that outputs md5("{{randstr}}") (line 96), but the verification matcher checks if the response body contains the plaintext {{randstr}} (line 121). This is a logic mismatch: the PHP code will output a 32-character hexadecimal MD5 hash, not the original random string. As a result, the matcher will never succeed, even when targeting a vulnerable system.
| - contains(body, "{{randstr}}") | |
| - contains(body, "{{randstr}}") | |
| + contains(body, md5("{{randstr}}")) |
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@http/cves/2026/CVE-2026-38526.yaml` at line 121, the matcher checks for
plaintext `{{randstr}}` in the response body, but the uploaded PHP code at line
96 outputs `md5("{{randstr}}")`. Change the matcher from `contains(body,
"{{randstr}}")` to `contains(body, md5("{{randstr}}"))` to correctly verify that
the uploaded PHP file executed and returned the expected MD5 hash.
PR Information
Template validation
PoC Screenshots
Step 1:

Step 2:

Step 3:

Step 4:

Step 5:

Additional Details (leave it blank if not applicable)
Additional References: