mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
35 lines
1.3 KiB
YAML
35 lines
1.3 KiB
YAML
id: coldfusion-cfide-dir-listing
|
|
|
|
info:
|
|
name: Adobe ColdFusion CFIDE - Directory Listing
|
|
author: 0x_Akoko
|
|
severity: medium
|
|
description: |
|
|
Detected Adobe ColdFusion CFIDE directory listing was exposed. This can reveal sensitive files and subdirectories including administrator interfaces, scripts, and application components.
|
|
reference:
|
|
- https://helpx.adobe.com/coldfusion/kb/securing-coldfusion.html
|
|
- https://www.carnal0wnage.com/papers/LARES-ColdFusion.pdf
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cwe-id: CWE-548
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
shodan-query: http.title:"Index of" http.html:"CFIDE"
|
|
fofa-query: title="Index of" && body="CFIDE"
|
|
tags: misconfig,coldfusion,adobe,exposure,listing
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/CFIDE/"
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains_all(body, "Index of", "CFIDE")'
|
|
- 'contains_any(body, "administrator", "scripts", "componentutils", "wizards", "adminapi")'
|
|
condition: and
|
|
# digest: 4a0a004730450221009f5d9c035944832ad0f3250a2c6b03e4c3f8587b7a79cd1961caced43d19eb55022056500b3df65cfdfbc3e2a1dab673b2e534e292c65d91a8f32b092cb6adfc362f:922c64590222798bb761d5b6d8e72950 |