nuclei-templates/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml

47 lines
1.3 KiB
YAML

id: zzzcms-info-disclosure
info:
name: Zzzcms 1.75 - Information Disclosure
author: ritikchaddha
severity: low
description: |
There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\webuploader\js\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore
reference:
- https://xz.aliyun.com/t/7414
metadata:
verified: true
max-request: 1
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
product: zzzcms
vendor: zzzcms
tags: zzzcms,info,disclosure
classification:
cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
GET /plugins/webuploader/js/webconfig.php HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'var adminpath'
- 'var imageMaxSize='
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502202a3a4916c5fadccff982078fec5a98de45b89076f013e080cad56b7f25fd7327022100bc6f7789895c6bb952913f2990bb4214961e49148417b7b16e969c14585ea09d:922c64590222798bb761d5b6d8e72950