Template Details
Description: Jeewms a JAVA-based warehouse management system is vulnerable to Fileread. An attacker can read the servers sensitive files using a special crafted requested with the vulnerable parameter dbPath=
Severity: High
Shodan/Censys Dork: "JEEWMS"
How to Run: echo "target"| httpx --silent | nuclei -t jeewms-fileread.yaml
Demo/Testing Instance: http://47.113.229.131:8087