Skip to content

Lazy File Manager

ID: lazy-file-manager

Severity: medium

Author: amsda

Tags: exposure

lfm.php file in exposed in Lazy File Manager.

id: lazy-file-manager
info:
name: Lazy File Manager
author: amsda
severity: medium
description: lfm.php file in exposed in Lazy File Manager.
metadata:
max-request: 1
tags: exposure
http:
- method: GET
path:
- "{{BaseURL}}/lfm.php"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- Lazy File Manager
# digest: 490a0046304402203aa36b4aba97ca69c1bf79a7df4db76b427a4e9d0db81befdcda5dbc22392a9e022077f7686d64cf9fe870fbc99d3dcc7082629c57a07dae0c4557b516c87a9fedf5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/lazy-file.yaml"

View on Github