nuclei-templates/http/miscellaneous/exposed-file-upload-form.yaml

37 lines
1.1 KiB
YAML
Raw Normal View History

2022-10-04 14:57:16 +00:00
id: exposed-file-upload-form
info:
name: Exposed File Upload Form
author: geeknik
2023-01-26 15:36:55 +00:00
severity: info
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:creativedream_file_uploader_project:creativedream_file_uploader:*:*:*:*:*:*:*:*
2023-01-19 09:12:32 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: creativedream_file_uploader_project
2024-09-10 09:08:16 +00:00
product: creativedream_file_uploader
shodan-query: http.html:"multipart/form-data" html:"file"
2024-01-14 09:21:50 +00:00
tags: miscellaneous,exposure,upload,form,misc,generic
2022-10-04 14:57:16 +00:00
http:
2022-10-04 14:57:16 +00:00
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
regex:
- <form.*?method=("|')?post("|')?.*?>
2023-01-19 09:47:55 +00:00
- <form.*?(?i)(?-i)enctype=("|')?multipart\/form-data("|')?.*?>
2022-10-04 14:57:16 +00:00
- <input.*?type=("|')?file("|')?.*?>
2023-01-19 09:12:32 +00:00
condition: or
2023-01-19 09:47:55 +00:00
- type: regex
regex:
- "type=[\"'](file)[\"']"
2023-01-19 09:12:32 +00:00
- 'id="file"'
condition: or
2024-09-10 09:08:16 +00:00
# digest: 490a0046304402206e7efb13f76fa18665f5ecd860e844ce34e9b8b807437aefa6aa591e53a25fa2022048ca326395148e880ff617e8a94bce723ee32cd0531124508a71e6f8623416c7:922c64590222798bb761d5b6d8e72950