nuclei-templates/http/takeovers/uptimerobot-takeover.yaml

39 lines
947 B
YAML
Raw Normal View History

id: uptimerobot-takeover
info:
name: uptimerobot takeover detection
2021-06-09 12:20:56 +00:00
author: pdteam
2021-09-07 16:01:50 +00:00
severity: low
2023-12-22 08:59:06 +00:00
description: uptimerobot takeover was detected.
2021-09-07 16:01:50 +00:00
reference:
- https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/45
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: takeover
http:
- method: GET
path:
- "{{BaseURL}}"
2021-09-07 16:01:50 +00:00
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: regex
regex:
2021-09-07 16:01:50 +00:00
- "^page not found$"
2023-08-10 00:04:03 +00:00
- type: word
part: header
words:
2023-08-10 03:40:27 +00:00
- "Server: Caddy"
case-insensitive: true
2023-08-10 00:04:03 +00:00
2021-09-07 16:01:50 +00:00
- type: status
status:
2023-08-10 00:04:03 +00:00
- 404
# digest: 4a0a004730450220721196f64418a6eb526f619f162fcd1fbab5d2b0fe31bf1384cce7b528c31c88022100dac350b5f6b730091041f3aabe46735bed8e0b78fce6a268e96bc59e1f00a7c0:922c64590222798bb761d5b6d8e72950