nuclei-templates/http/exposed-panels/redmine-panel.yaml

31 lines
842 B
YAML
Raw Normal View History

2024-09-10 08:22:50 +00:00
id: redmine-panel
info:
name: Redmine Login Panel - Detect
author: righettod
severity: info
description: Redmine login panel was detected.
reference:
- https://www.redmine.org/
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: redmine
2024-09-10 09:08:16 +00:00
product: redmine
shodan-query: http.html:'content="Redmine'
tags: panel,redmine,login,detect
2024-09-10 08:22:50 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "content=\"Redmine")'
2024-09-04 15:35:24 +00:00
condition: and
2024-09-12 05:14:01 +00:00
# digest: 4b0a00483046022100e3ad0ad4168770bb5d86732d0032c4549b9bbfce7b3c8d28bba481c5965a0af7022100adea55474c187343d4fb7f1a5eb0f00b751095f812d8f3824bef768ad2d38256:922c64590222798bb761d5b6d8e72950