Skip to content

Exposed File Upload Form

ID: exposed-file-upload-form

Severity: info

Author: geeknik

Tags: miscellaneous,exposure,upload,form,misc,generic

id: exposed-file-upload-form
info:
name: Exposed File Upload Form
author: geeknik
severity: info
classification:
cpe: cpe:2.3:a:creativedream_file_uploader_project:creativedream_file_uploader:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: creativedream_file_uploader_project
product: creativedream_file_uploader
shodan-query: http.html:"multipart/form-data" html:"file"
tags: miscellaneous,exposure,upload,form,misc,generic
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
regex:
- <form.*?method=("|')?post("|')?.*?>
- <form.*?(?i)(?-i)enctype=("|')?multipart\/form-data("|')?.*?>
- <input.*?type=("|')?file("|')?.*?>
condition: or
- type: regex
regex:
- "type=[\"'](file)[\"']"
- 'id="file"'
condition: or
# digest: 4a0a00473045022100ee906e3f0d839b0f68459869deeba72549761744e154f778aaa5fa9373260abc02202accc536ad1855768a1a934e5042c4563114d93b46acb988a25fcc15de7326fb:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/miscellaneous/exposed-file-upload-form.yaml"

View on Github