nuclei-templates/http/exposed-panels/syncthru-web-service.yaml

41 lines
1.1 KiB
YAML
Raw Normal View History

2022-08-17 17:31:50 +00:00
id: syncthru-web-service
info:
name: SyncThru Web Service Panel - Detect
2022-08-17 17:31:50 +00:00
author: DhiyaneshDk
severity: info
description: SyncThru Web Service panel was detected.
2022-08-17 17:31:50 +00:00
reference:
- https://www.exploit-db.com/ghdb/7843
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:samsung:syncthru_web_service:*:*:*:*:*:*:*:*
2022-08-17 17:31:50 +00:00
metadata:
2023-10-14 11:27:55 +00:00
max-request: 1
product: syncthru_web_service
2022-08-17 17:31:50 +00:00
shodan-query: title:"SyncThru Web Service"
vendor: samsung
verified: true
tags: edb,panel,syncthru,printer,samsung
2022-08-17 17:31:50 +00:00
http:
2022-08-17 17:31:50 +00:00
- method: GET
path:
- "{{BaseURL}}/sws/index.sws"
matchers-condition: and
matchers:
- type: word
words:
- "<title>SyncThru Web Service</title>"
- type: word
2022-08-20 09:27:28 +00:00
part: header
2022-08-17 17:31:50 +00:00
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a0046304402206654dd421b720c8a55c6f157d816df953f80f8f389496e6c2a43b1f87036a264022000cbf6bf68847eaddd897d0dc0d9d2b95aed7bd15fc3b5b591ee838aeb85cab9:922c64590222798bb761d5b6d8e72950