Adds a new HTTP template for CVE-2021-30116 under http/cves/2021.
This template detects unauthenticated credential disclosure via /dl.asp?load=KaseyaD.ini and extracts AdminPwd and SessionCookie.
No version-based checks.
I’ve validated this template locally?
YES [X] NO [ ]
/claim #12758
Template path: http/cves/2021/CVE-2021-30116.yaml
Proof-of-Concept artifacts (attached below):
Dockerfiledefault.confKaseyaD.iniDebug data (attached below):
debug.log (scan against the vulnerable POC) debug.logclean.log (scan against a clean environment) clean.logNote on HTTP protocol:
This CVE can only be exploited via HTTP GET on /dl.asp?load=KaseyaD.ini.
Per the FAQ, HTTP-only templates are blocked by default but allowed here as a critical exception, since no other protocol applies.
Additional References: Nuclei Template Creation Guideline Nuclei Template Matcher Guideline Nuclei Template Contribution Guideline PD-Community Discord server
guiknx
@guiknx
ProjectDiscovery
@projectdiscovery