Open skalvin opened 5 months ago
@skalvin do you have an example / cmd to share that can be used to reproduce this?
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.3.4
projectdiscovery.io
[INF] Current nuclei version: v3.3.4 (latest)
[INF] Current nuclei-templates version: v10.0.1 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 86
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 86
[INF] No results found. Better luck next time!
user@cloudshell:~/waymore (day-434014)$ cat results/testphp.vulnweb.com/waymore.txt | grep "=" | uro | grep "file" | nuclei -t /home/user/fuzz/lfi/linux-lfi-fuzz.yaml -fuzz
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.3.4
projectdiscovery.io
[INF] Current nuclei version: v3.3.4 (latest)
[INF] Current nuclei-templates version: v10.0.1 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 86
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 2
[linux-lfi-fuzz] [http] [high] http://testphp.vulnweb.com/showimage.php?file=../../etc/passwd [GET]
user@cloudshell:~/waymore (day-434014)$ cat results/testphp.vulnweb.com/waymore.txt | grep "=" | uro | nuclei -t /home/user/fuzz/lfi/linux-lfi-fuzz.yaml -fuzz -rl 10
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.3.4
projectdiscovery.io
[INF] Current nuclei version: v3.3.4 (latest)
[INF] Current nuclei-templates version: v10.0.1 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 86
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 86
[INF] No results found. Better luck next time!
user@cloudshell:~/waymore (day-434014)$ cat results/testphp.vulnweb.com/waymore.txt | grep "=" | uro | nuclei -t /home/user/fuzz/lfi/linux-lfi-fuzz.yaml -fuzz -rl 1
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.3.4
projectdiscovery.io
[INF] Current nuclei version: v3.3.4 (latest)
[INF] Current nuclei-templates version: v10.0.1 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 86
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 86
[INF] No results found. Better luck next time!
user@cloudshell:~/waymore (day-434014)$ ```
still it can't detect LFI vulnerability on v3.3.5 with the linux-lfi-fuzz.yaml
Nuclei version 3.2.9 cannot identify LFI using linux-lfi-fuzz.yaml
The prior version detected correctly; but, with the last update 3.2.9, it no longer does.