Files
nuclei-templates/http/misconfiguration/sql-server-report-viewer.yaml

35 lines
1.2 KiB
YAML
Raw Normal View History

2023-04-21 01:39:49 +05:30
id: sql-server-reportviewer
info:
2023-04-21 01:39:49 +05:30
name: SQL Server ReportViewer - Exposure
author: kazet
severity: high
2024-01-03 11:38:41 +05:30
description: SQL Server ReportViewer page exposed.
reference:
- https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16
2024-09-10 14:38:16 +05:30
classification:
cpe: cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:*:*
2023-04-21 01:39:49 +05:30
metadata:
2023-06-04 13:43:42 +05:30
verified: true
2023-10-14 16:57:55 +05:30
max-request: 2
2024-09-10 13:52:50 +05:30
vendor: microsoft
2024-09-10 14:38:16 +05:30
product: sql_server
google-query: inurl:"/Reports/Pages/Folder.aspx"
tags: misconfig,sql,report,exposure
http:
2023-04-21 01:39:49 +05:30
- raw:
- |
GET /Reports/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
- |
GET /ReportServer/Pages/Folder.aspx HTTP/1.1
Host: {{Hostname}}
2023-04-21 01:39:49 +05:30
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && status_code_2 != 401"
- "contains(body, 'Data Source') && contains(body, 'SQL Server Reporting Services')"
condition: and
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022100b217f683b106dc6255adb3175d815b155c1eca01f168c252e2d4325ab0cb0b5a02200d7f88a82ed9b48d68d3d62fc420c1f18e92c450db3594b14ade1a2d8cca9ef6:922c64590222798bb761d5b6d8e72950