Update and rename magento-downloader.yaml to magento-downloader-panel.yaml
parent
d13caf5de6
commit
188dd968fd
|
@ -0,0 +1,46 @@
|
|||
id: magento-downloader-panel
|
||||
|
||||
info:
|
||||
name: Magento Downloader Exposed
|
||||
author: 5up3r541y4n
|
||||
severity: info
|
||||
description: |
|
||||
Magento Connect Manager available via /downloader/ location is used for installation of Magento extensions and Magento upgrades and requires Magento admin rights for the action. It uses the same authorization methods as for Backend. Therefore if bot will find out a matching pair of login/password, whole Magento installation will be compromised. Attacker will be able to discover backend URL for login (even if it is customized as described in Securing Magento /admin/), install a Filesystem extension to obtain full access to all files and finally database.
|
||||
reference:
|
||||
- https://magentary.com/kb/restrict-access-to-magento-downloader/
|
||||
- https://www.mageplaza.com/kb/how-to-stop-brute-force-attacks-magento.html#solution-3
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.component:"Magento"
|
||||
tags: magento,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/downloader/'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "Magento Downloader"
|
||||
- "Log In"
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '\(Magento Connect Manager ver\. ([0-9.]+)'
|
|
@ -1,33 +0,0 @@
|
|||
id: magento-downloader
|
||||
|
||||
info:
|
||||
name: Magento Downloader
|
||||
author: 5up3r541y4n
|
||||
severity: medium
|
||||
description: Magento Connect Manager available via /downloader/ location is used for installation of Magento extensions and Magento upgrades and requires Magento admin rights for the action. It uses the same authorization methods as for Backend. Therefore if bot will find out a matching pair of login/password, whole Magento installation will be compromised. Attacker will be able to discover backend URL for login (even if it is customized as described in Securing Magento /admin/), install a Filesystem extension to obtain full access to all files and finally database.
|
||||
reference:
|
||||
- https://magentary.com/kb/restrict-access-to-magento-downloader/
|
||||
- https://www.mageplaza.com/kb/how-to-stop-brute-force-attacks-magento.html#solution-3
|
||||
tags: magento
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/downloader/'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "Magento Downloader"
|
||||
- "Log In"
|
||||
part: body
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "text/html"
|
||||
part: header
|
Loading…
Reference in New Issue