nuclei-templates/http/takeovers/uptimerobot-takeover.yaml

40 lines
901 B
YAML
Raw Normal View History

id: uptimerobot-takeover
info:
name: uptimerobot takeover detection
2021-06-09 12:20:56 +00:00
author: pdteam
2021-09-07 16:01:50 +00:00
severity: low
reference:
- https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/45
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: takeover
http:
- method: GET
path:
- "{{BaseURL}}"
2021-09-07 16:01:50 +00:00
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: regex
regex:
2021-09-07 16:01:50 +00:00
- "^page not found$"
2023-08-10 00:04:03 +00:00
- type: word
part: header
words:
2023-08-10 03:40:27 +00:00
- "Server: Caddy"
case-insensitive: true
2023-08-10 00:04:03 +00:00
2021-09-07 16:01:50 +00:00
- type: status
status:
2023-08-10 00:04:03 +00:00
- 404
# digest: 4b0a00483046022100dc400ad371fbecea451da1e543b2252087b69ac26f3bd2abb99db8bd6b6f4fb70221008f740e9dfa30c56335b70ceebed2b684eda34ceb848d12e1e2bcf37d32e3f56a:922c64590222798bb761d5b6d8e72950