- 
                Notifications
    You must be signed in to change notification settings 
- Fork 3.1k
Description
Template IDs or paths
/http/vulnerabilities/generic/generic-linux-lfi.yamlEnvironment
- OS: Ubuntu
- Nuclei: 3.4.2Steps To Reproduce
- Create a web server with one of the words in the 1st flow in the signature in the root:
matchers:
- type: word
words:
- "Linux"
- "Ubuntu"
- "CentOS"
- "Apache"
- "nginx"
condition: or
internal: true
(Note: I strongly disagree with this initial fingerprint for this particular signature, and think that this alone basically completely neuters the signature/will create tons of false negatives, but that is not the point of the issue)
- Place <html>root:.*:0:0:</html>at /etc/passwd on the web server.
- Execute the signature:
./nuclei -u http://yourtestsite --tags lfi
- The signature will not fire
- Remove the redundant extra - method: GET(line 35)
- rerun, detects as expected
Relevant dumped responses
Anything else?
The issue appears to be the extra   - method: GET on line 35.
I randomly discovered this because we just so happened to use the /http/vulnerabilities/generic/generic-linux-lfi.yaml template as part of our tests in BBOT to test our integration with Nuclei, causing our tests to fail as a result.
May be worth double-checking the rest of the multiple request/flow roll out (d694ffe) or adding additional tests / validation if something like this was able to slip through.