nuclei-templates/misconfiguration/exposed-jquery-file-upload....

26 lines
497 B
YAML
Raw Normal View History

2021-06-05 16:34:09 +00:00
id: exposed-jquery-file-upload
info:
name: Exposed jQuery File Upload
author: dhiyaneshDk
severity: medium
reference:
- https://www.exploit-db.com/exploits/45584
tags: exposure,jquery,edb
2021-06-05 16:34:09 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/jquery-file-upload/server/php/"
2021-06-06 12:25:05 +00:00
matchers-condition: and
2021-06-05 16:34:09 +00:00
matchers:
- type: regex
regex:
- '^{\"files\":'
part: body
2021-06-06 12:25:05 +00:00
- type: word
words:
- "text/plain"
part: header