Update and rename magento-downloader.yaml to magento-downloader-panel.yaml

patch-1
Prince Chaddha 2022-06-15 11:29:33 +05:30 committed by GitHub
parent d13caf5de6
commit 188dd968fd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 46 additions and 33 deletions

View File

@ -0,0 +1,46 @@
id: magento-downloader-panel
info:
name: Magento Downloader Exposed
author: 5up3r541y4n
severity: info
description: |
Magento Connect Manager available via /downloader/ location is used for installation of Magento extensions and Magento upgrades and requires Magento admin rights for the action. It uses the same authorization methods as for Backend. Therefore if bot will find out a matching pair of login/password, whole Magento installation will be compromised. Attacker will be able to discover backend URL for login (even if it is customized as described in Securing Magento /admin/), install a Filesystem extension to obtain full access to all files and finally database.
reference:
- https://magentary.com/kb/restrict-access-to-magento-downloader/
- https://www.mageplaza.com/kb/how-to-stop-brute-force-attacks-magento.html#solution-3
metadata:
verified: true
shodan-query: http.component:"Magento"
tags: magento,exposure
requests:
- method: GET
path:
- '{{BaseURL}}/downloader/'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Magento Downloader"
- "Log In"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '\(Magento Connect Manager ver\. ([0-9.]+)'

View File

@ -1,33 +0,0 @@
id: magento-downloader
info:
name: Magento Downloader
author: 5up3r541y4n
severity: medium
description: Magento Connect Manager available via /downloader/ location is used for installation of Magento extensions and Magento upgrades and requires Magento admin rights for the action. It uses the same authorization methods as for Backend. Therefore if bot will find out a matching pair of login/password, whole Magento installation will be compromised. Attacker will be able to discover backend URL for login (even if it is customized as described in Securing Magento /admin/), install a Filesystem extension to obtain full access to all files and finally database.
reference:
- https://magentary.com/kb/restrict-access-to-magento-downloader/
- https://www.mageplaza.com/kb/how-to-stop-brute-force-attacks-magento.html#solution-3
tags: magento
requests:
- method: GET
path:
- '{{BaseURL}}/downloader/'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "Magento Downloader"
- "Log In"
part: body
- type: word
words:
- "text/html"
part: header