nuclei-templates/http/miscellaneous/exposed-file-upload-form.yaml

36 lines
1.1 KiB
YAML
Raw Normal View History

2022-10-04 14:57:16 +00:00
id: exposed-file-upload-form
info:
name: Exposed File Upload Form
author: geeknik
2023-01-26 15:36:55 +00:00
severity: info
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:creativedream_file_uploader_project:creativedream_file_uploader:*:*:*:*:*:*:*:*
2023-01-19 09:12:32 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: creativedream_file_uploader_project
2024-09-10 09:08:16 +00:00
product: creativedream_file_uploader
shodan-query: http.html:"multipart/form-data" html:"file"
2024-01-14 09:21:50 +00:00
tags: miscellaneous,exposure,upload,form,misc,generic
2022-10-04 14:57:16 +00:00
http:
2022-10-04 14:57:16 +00:00
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
regex:
- <form.*?method=("|')?post("|')?.*?>
2023-01-19 09:47:55 +00:00
- <form.*?(?i)(?-i)enctype=("|')?multipart\/form-data("|')?.*?>
2022-10-04 14:57:16 +00:00
- <input.*?type=("|')?file("|')?.*?>
2023-01-19 09:12:32 +00:00
condition: or
2023-01-19 09:47:55 +00:00
- type: regex
regex:
- "type=[\"'](file)[\"']"
2023-01-19 09:12:32 +00:00
- 'id="file"'
condition: or
2024-09-12 05:14:01 +00:00
# digest: 4a0a0047304502200cfb73db19e23ffcae4a653495e61457d91a3a5e7659ab6fe0cfd47e360217fe022100eded2d7e5799285632b56429e71e6d056e7781017d99f25451835073d8feeb60:922c64590222798bb761d5b6d8e72950