nuclei-templates/exposed-panels/magento-downloader-panel.yaml

47 lines
1.5 KiB
YAML
Raw Normal View History

id: magento-downloader-panel
info:
name: Magento Downloader Exposed
author: 5up3r541y4n
severity: info
description: |
Magento Connect Manager available via /downloader/ location is used for installation of Magento extensions and Magento upgrades and requires Magento admin rights for the action. It uses the same authorization methods as for Backend. Therefore if bot will find out a matching pair of login/password, whole Magento installation will be compromised. Attacker will be able to discover backend URL for login (even if it is customized as described in Securing Magento /admin/), install a Filesystem extension to obtain full access to all files and finally database.
reference:
- https://magentary.com/kb/restrict-access-to-magento-downloader/
- https://www.mageplaza.com/kb/how-to-stop-brute-force-attacks-magento.html#solution-3
metadata:
verified: true
shodan-query: http.component:"Magento"
tags: magento,exposure
requests:
- method: GET
path:
- '{{BaseURL}}/downloader/'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Magento Downloader"
- "Log In"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '\(Magento Connect Manager ver\. ([0-9.]+)'