diff --git a/http/misconfiguration/prowlarr-dashboard-unauth.yaml b/http/misconfiguration/prowlarr-dashboard-unauth.yaml new file mode 100644 index 0000000000..ca162c723f --- /dev/null +++ b/http/misconfiguration/prowlarr-dashboard-unauth.yaml @@ -0,0 +1,38 @@ +id: prowlarr-dashboard-unauth + +info: + name: Prowlarr Dashboard - Unauthenticated + author: ProjectDiscoveryAI + severity: medium + description: | + Exposure of Prowlarr dashboard which can lead to sensitive information disclosure. + metadata: + verified: true + max-request: 1 + shodan-query: html:"prowlarr" + tags: prowlarr,dashboard,unauth,misconfig + +http: + - method: GET + path: + - "{{BaseURL}}" + + host-redirects: true + max-redirects: 2 + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Prowlarr" + + - type: word + part: body + words: + - "Login - Prowlarr" + negative: true + + - type: status + status: + - 200 diff --git a/prowlarr-general-settings.yaml b/prowlarr-general-settings.yaml deleted file mode 100644 index a629ee0b2b..0000000000 --- a/prowlarr-general-settings.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: prowlarr-general-settings - -info: - name: Prowlarr General Settings Exposure - author: ProjectDiscoveryAI - severity: medium - description: | - This template checks for exposed Prowlarr general settings which can lead to sensitive information disclosure. - -http: - - raw: - - | - GET /prowlarr/settings/general HTTP/1.1 - Host: {{Hostname}} - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: word - words: - - "Prowlarr" - - "Settings" - - "General" \ No newline at end of file