nuclei-templates/http/takeovers/uptimerobot-takeover.yaml

44 lines
1.0 KiB
YAML
Raw Normal View History

id: uptimerobot-takeover
info:
name: uptimerobot takeover detection
2021-06-09 12:20:56 +00:00
author: pdteam
2021-09-07 16:01:50 +00:00
severity: low
2023-12-22 08:59:06 +00:00
description: uptimerobot takeover was detected.
2021-09-07 16:01:50 +00:00
reference:
- https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/45
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: takeover
http:
- method: GET
path:
- "{{BaseURL}}"
2021-09-07 16:01:50 +00:00
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: regex
regex:
2021-09-07 16:01:50 +00:00
- "^page not found$"
2023-08-10 00:04:03 +00:00
- type: word
part: header
words:
2023-08-10 03:40:27 +00:00
- "Server: Caddy"
case-insensitive: true
2023-08-10 00:04:03 +00:00
2021-09-07 16:01:50 +00:00
- type: status
status:
2023-08-10 00:04:03 +00:00
- 404
2024-07-10 11:31:30 +00:00
extractors:
- type: dsl
dsl:
- "resolve(Host, 'cname')"
# digest: 490a004630440220107442093374d13645d0fc634dbd22e0f935034d353c5e008af1f425915be41e0220425e7e0dc419aa3b41478ad23144a355d6a91a2b2e2b57ff14075160cef6f917:922c64590222798bb761d5b6d8e72950