nuclei-templates/http/misconfiguration/cx-cloud-upload-detect.yaml

28 lines
784 B
YAML

id: cx-cloud-upload-detect
info:
name: CX Cloud Unauthenticated Upload - Detect
author: dhiyaneshDk
severity: info
description: CX Cloud unauthenticated upload was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
max-request: 1
tags: fileupload,misconfig,intrusive
http:
- method: GET
path:
- '{{BaseURL}}/upload.jsp'
matchers:
- type: word
words:
- "<HEAD><TITLE>Display file upload form to the user</TITLE></HEAD>"
condition: and
# digest: 4a0a00473045022100960dc99eed0d6d5b671c03305cd846f52102e8de1c7945b48f71160785822ec1022016d7774722833d378e5b7845cb476dfd6818b759b554ad5f691b8dfc2ae292da:922c64590222798bb761d5b6d8e72950