Fuzzing with nuclei

LFI Example

LFI (Local File Inclusion) is a vulnerability that allows an attacker to read files on the server. In this example, we will use a template to detect LFI vulnerabilities.

Download the Template
To get the example template run:

wget https://gitlab.com/brendan/fuzzbuzz/-/raw/main/examples/linux-lfi.yaml

or get the file here.
Run the command
To run the template, in the same folder run this command:

nuclei -t linux-lfi.yaml -u https://fuzzbuzz.vercel.app/api/lfi\?file\= -dast
Explaining the command
The first part of the command uses -t to tell nuclei to use the local template file `linux-lfi.yaml`:

nuclei -t linux-lfi.yaml

The second part of the command uses -u to specify the URL to test:

-u https://fuzzbuzz.vercel.app/api/lfi\?file\=

Note that it escalates the URL with the parameter `file=` to test for LFI.

The last part of the command uses -dast to enable the DAST engine to fuzz test for LFI vulnerabilities.
Expected output
The output of your command should look something like:

Nuclei output