nuclei-templates/http/exposed-panels/redmine-panel.yaml

32 lines
843 B
YAML
Raw Normal View History

2024-09-10 08:22:50 +00:00
id: redmine-panel
info:
name: Redmine Login Panel - Detect
author: righettod
severity: info
description: Redmine login panel was detected.
reference:
- https://www.redmine.org/
metadata:
verified: true
max-request: 1
shodan-query: http.html:'content="Redmine'
2024-09-10 08:22:50 +00:00
product: redmine
vendor: redmine
tags: panel,redmine,login,detect
2024-09-10 08:22:50 +00:00
classification:
cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "content=\"Redmine")'
2024-09-04 15:35:24 +00:00
condition: and
2024-09-10 08:22:50 +00:00
# digest: 4b0a00483046022100d9b0e50f13ca98e0c3ba5e2eb5b76dd14fb16facbc34ae8219a36072b8d47820022100e0a32cf92100515311bb77cc9b08b53d355faaaeb067385a4ee3a91cf0f842e9:922c64590222798bb761d5b6d8e72950