nuclei-templates/http/misconfiguration/put-method-enabled.yaml

34 lines
1.2 KiB
YAML

id: put-method-enabled
info:
name: PUT Method Enabled
author: xElkomy
severity: high
description: The HTTP PUT method is normally used to upload data that is saved on the server at a user-supplied URL. If enabled, an attacker may be able to place arbitrary, and potentially malicious, content into the application. Depending on the server's configuration, this may lead to compromise of other users (by uploading client-executable scripts), compromise of the server (by uploading server-executable code), or other attacks.
reference:
- https://portswigger.net/kb/issues/00100900_http-put-method-is-enabled
metadata:
max-request: 2
tags: injection,misconfig,intrusive
http:
- raw:
- |
PUT /testing-put.txt HTTP/1.1
Host: {{Hostname}}
Content-Type: text/plain
{{randstr}}
- |
GET /testing-put.txt HTTP/1.1
Host: {{Hostname}}
Content-Type: text/plain
req-condition: true
matchers:
- type: dsl
dsl:
- 'contains(body_2, "{{randstr}}")'
# digest: 4b0a00483046022100adda9fed1196105a82707f130a749aff367a92958d8c5a3a0f37ded97fd8aec1022100fc875900eaf19fd356f7ebe9b8b7a881e73b54f222339b51bd28e4cd2de6ffec:922c64590222798bb761d5b6d8e72950