nuclei-templates/http/fuzzing/iis-shortname.yaml

48 lines
1.7 KiB
YAML
Raw Normal View History

2020-10-24 21:21:17 +00:00
id: iis-shortname
2020-10-24 21:21:17 +00:00
info:
name: IIS - Short Name Detect
2020-10-24 21:21:17 +00:00
author: nodauf
severity: info
description: A website running via IIS on an old .net framework contains a get request vulnerability. Using the the tilde character "~" in the request, an attacker can locate short names of files and folders not normally visible.
reference:
- https://github.com/lijiejie/IIS_shortname_Scanner
- https://www.exploit-db.com/exploits/19525
- http://soroush.secproject.com/blog/2012/06/microsoft-iis-tilde-character-vulnerabilityfeature-short-filefolder-name-disclosure/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
2023-10-14 11:27:55 +00:00
cvss-score: 0
cwe-id: CWE-200
metadata:
max-request: 4
2023-10-14 11:27:55 +00:00
tags: fuzz,edb
2020-10-24 21:21:17 +00:00
http:
2021-03-09 08:12:02 +00:00
- raw:
- |
GET /N0t4xist*~1*/a.aspx HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
GET /*~1*/a.aspx' HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
OPTIONS /N0t4xist*~1*/a.aspx HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
OPTIONS /*~1*/a.aspx' HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
2020-10-24 21:21:17 +00:00
2021-03-11 12:44:19 +00:00
req-condition: true
2020-10-24 21:21:17 +00:00
matchers:
- type: dsl
dsl:
- "status_code_1!=404 && status_code_2 == 404 || status_code_3 != 404 && status_code_4 == 404"