This PR delivers complete, production-ready Nuclei templates for CVE-2020-14756, fully addressing all reviewer feedback.
| Issue Identified | Resolution |
|---|---|
| Service fingerprinting only | Complete serialized gadget chain payload (AttributeHolder → TopNAggregator → MvelExtractor) |
| False positive detections | OOB verification via interactsh - matches only when code executes |
| No JavaScript implementation | JavaScript template created per @Akokonunes request |
| Template | Type | Path |
|---|---|---|
| Network Template | TCP/T3 Protocol | network/cves/2020/CVE-2020-14756.yaml |
| JavaScript Template | T3 via nuclei/net | javascript/cves/2020/CVE-2020-14756.yaml |
Both templates use matchers-condition: and requiring:
This ensures zero false positives - patched servers respond to T3 but won’t trigger the callback.
Aditya Choudhry
@kajal1322705
ProjectDiscovery
@projectdiscovery