Files
nuclei-templates/http/misconfiguration/cx-cloud-upload-detect.yaml
2024-12-01 13:57:55 +00:00

26 lines
782 B
YAML

id: cx-cloud-upload-detect
info:
name: CX Cloud Unauthenticated Upload - Detect
author: dhiyaneshDk
severity: info
description: CX Cloud unauthenticated upload was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
max-request: 1
tags: fileupload,misconfig,intrusive
http:
- method: GET
path:
- '{{BaseURL}}/upload.jsp'
matchers:
- type: word
words:
- "<HEAD><TITLE>Display file upload form to the user</TITLE></HEAD>"
condition: and
# digest: 4a0a0047304502207f8b92e62ce08e4fc4b35490974bcda994600f730117693b6803f3a079f0f60b022100f2ef62a57a45a70076e89f1f68520beff374951f068812739e650473a5928057:922c64590222798bb761d5b6d8e72950