nuclei-templates/http/misconfiguration/unauth-mercurial.yaml

35 lines
908 B
YAML
Raw Permalink Normal View History

id: unauth-mercurial
2022-11-17 18:52:32 +00:00
info:
name: Unauthenticated Mercurial Detect
author: pussycat0x
severity: high
2024-01-03 06:08:41 +00:00
description: Mercurial repositories index is disclosed.
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*
2022-11-17 18:52:32 +00:00
metadata:
2022-11-18 03:33:42 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: mercurial
2024-09-10 09:08:16 +00:00
product: mercurial
shodan-query: html:"Mercurial repositories index"
2022-11-17 18:52:32 +00:00
tags: misconfig,unauth,mercurial
http:
2022-11-17 18:52:32 +00:00
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Mercurial Repositories"
- "Last modified"
condition: and
2022-11-21 06:16:36 +00:00
2022-11-17 18:52:32 +00:00
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 4a0a0047304502202faff6e88bf6b00cf0dca0e9e7d41b65d3b7b37ec86b2b4ea854cdbe76995b5a0221009d6ba930ffab29d4f74778647deebea5b25e17628e5d92a9f6a394546bc5e218:922c64590222798bb761d5b6d8e72950