nuclei-templates/http/misconfiguration/proxy/open-proxy-portscan.yaml

65 lines
2.0 KiB
YAML
Raw Normal View History

id: open-proxy-portscan
info:
name: Open Proxy to Ports on the Proxy's localhost Interface
author: sullo
severity: high
description: The host is configured as a proxy which allows access to its internal interface
reference:
- https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/
- https://en.wikipedia.org/wiki/Open_proxy
- https://www.acunetix.com/vulnerabilities/web/apache-configured-to-run-as-proxy/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-441
remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports.
tags: exposure,config,proxy,misconfig,fuzz
metadata:
max-request: 8
http:
- raw:
- |+
GET / HTTP/1.1
Host: {{Hostname}}
- |+
GET http://somethingelsethatdoesnotexist/ HTTP/1.1
Host: somethingelsethatdoesnotexist
- |+
GET http://127.0.0.1:21 HTTP/1.1
Host: 127.0.0.1
- |+
GET http://127.0.0.1:22 HTTP/1.1
Host: 127.0.0.1
- |+
GET http://127.0.0.1:25 HTTP/1.1
Host: 127.0.0.1
- |+
GET http://127.0.0.1:110 HTTP/1.1
Host: 127.0.0.1
- |+
GET http://127.0.0.1:587 HTTP/1.1
Host: 127.0.0.1
- |+
GET https://127.0.0.1:587 HTTP/1.1
Host: 127.0.0.1
unsafe: true
req-condition: true
matchers:
- type: dsl
condition: or
dsl:
2022-01-22 09:04:50 +00:00
- (!regex("(?i)FTP",body_1)) && (!regex("(?i)FTP",body_2)) && (regex("(?i)FTP",body_3))
- (!regex("(?i)SSH-[.]+-+",body_1)) && (!regex("(?i)SSH-[.]+-+",body_2)) && (regex("(?i)SSH-[.]+-+",body_4))
2022-01-22 09:04:50 +00:00
- (!regex("(?i)POP3",body_1)) && (!regex("(?i)POP3",body_2)) && (regex("(?i)POP3",body_6))
- (!regex("(?i)SMTP",body_1)) && (!regex("(?i)SMTP",body_2)) && ((regex("(?i)SMTP",body_5)) || (regex("(?i)SMTP",body_7)) || (regex("(?i)SMTP",body_8)))