Template Details


Description: Jeewms a JAVA-based warehouse management system is vulnerable to Fileread. An attacker can read the servers sensitive files using a special crafted requested with the vulnerable parameter dbPath=

Severity: High

Shodan/Censys Dork: "JEEWMS"

How to Run: echo "target"| httpx --silent | nuclei -t jeewms-fileread.yaml

Demo/Testing Instance: http://47.113.229.131:8087