nuclei-templates/http/takeovers/uptimerobot-takeover.yaml

44 lines
1013 B
YAML
Raw Permalink Normal View History

id: uptimerobot-takeover
info:
name: uptimerobot takeover detection
2021-06-09 12:20:56 +00:00
author: pdteam
2021-09-07 16:01:50 +00:00
severity: low
2023-12-22 08:59:06 +00:00
description: uptimerobot takeover was detected.
2021-09-07 16:01:50 +00:00
reference:
- https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/45
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: takeover
http:
- method: GET
path:
- "{{BaseURL}}"
2021-09-07 16:01:50 +00:00
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: regex
regex:
2021-09-07 16:01:50 +00:00
- "^page not found$"
2023-08-10 00:04:03 +00:00
- type: word
part: header
words:
2023-08-10 03:40:27 +00:00
- "Server: Caddy"
case-insensitive: true
2023-08-10 00:04:03 +00:00
2021-09-07 16:01:50 +00:00
- type: status
status:
2023-08-10 00:04:03 +00:00
- 404
2024-07-10 11:31:30 +00:00
extractors:
- type: dsl
dsl:
- cname
# digest: 4a0a0047304502206be7460d160e77cb11c05ec2a98ad231ae368388af54ece78b7a04d28fe234f3022100e54699fd45cd0b6309c8913a20279bfd85606d4933d51195a9ca716b915d7978:922c64590222798bb761d5b6d8e72950