nuclei-templates/http/exposures/configs/filestash-admin-config.yaml

36 lines
1004 B
YAML
Raw Normal View History

2024-06-28 09:45:28 +00:00
id: filestash-admin-config
info:
name: Filestash Admin Password Configuration
author: DhiyaneshDK
severity: high
description: |
Filestash is susceptible to the Admin Password Configuration page exposure due to misconfiguration.
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
2024-06-28 09:45:28 +00:00
metadata:
verified: true
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: filestash
2024-09-10 09:08:16 +00:00
product: filestash
shodan-query: html:"<title>Admin Console</title>"
2024-06-28 09:45:28 +00:00
tags: exposure,filestash,config
http:
- method: GET
path:
- "{{BaseURL}}/admin/setup"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Admin Console</title>'
- 'component-loader'
condition: and
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 4a0a0047304502205a85eca850380ad8f54a0c46f826cdafc31fdd4715e9e9bedf0cfe34bad23488022100dde07cf99e7df6d85e3488c9e2e919476e91f031d92f290ba0923ecb7460d467:922c64590222798bb761d5b6d8e72950