nuclei-templates/http/misconfiguration/sql-server-report-viewer.yaml

35 lines
1.2 KiB
YAML

id: sql-server-reportviewer
info:
name: SQL Server ReportViewer - Exposure
author: kazet
severity: high
description: SQL Server ReportViewer page exposed.
reference:
- https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16
classification:
cpe: cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: microsoft
product: sql_server
google-query: inurl:"/Reports/Pages/Folder.aspx"
tags: misconfig,sql,report,exposure
http:
- raw:
- |
GET /Reports/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
- |
GET /ReportServer/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && status_code_2 != 401"
- "contains(body, 'Data Source') && contains(body, 'SQL Server Reporting Services')"
condition: and
# digest: 4a0a00473045022077572e5231ff8cde2e21c43b8f29af94a583de7ea77a7379a6a084ba1b7fea33022100db983b82e2a1cdd5524e90a131b251046f6b489346964b2b7772389d3849be9f:922c64590222798bb761d5b6d8e72950