nuclei-templates/http/misconfiguration/sql-server-report-viewer.yaml

31 lines
1.0 KiB
YAML
Raw Permalink Normal View History

2023-04-20 20:09:49 +00:00
id: sql-server-reportviewer
info:
2023-04-20 20:09:49 +00:00
name: SQL Server ReportViewer - Exposure
author: kazet
severity: high
2024-01-03 06:08:41 +00:00
description: SQL Server ReportViewer page exposed.
reference:
- https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16
2023-04-20 20:09:49 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 2
2023-04-20 20:09:49 +00:00
google-query: inurl:"/Reports/Pages/Folder.aspx"
tags: misconfig,sql,report,exposure
http:
2023-04-20 20:09:49 +00:00
- raw:
- |
GET /Reports/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
- |
GET /ReportServer/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
2023-04-20 20:09:49 +00:00
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && status_code_2 != 401"
- "contains(body, 'Data Source') && contains(body, 'SQL Server Reporting Services')"
condition: and
# digest: 4b0a004830460221008feccb6f64b565bdc0c250a76bf836e3fa99a59c5a9b7f80327b4f4628fdeaa60221008a23345dd57c7dbbce3370ad35499b7aaf50fe496815d0d9c30740b73e81bccf:922c64590222798bb761d5b6d8e72950