From cad5270c8492ca9d2f0fec74a7fd942a7b3f4ad2 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Sun, 5 Feb 2023 11:28:05 -0500 Subject: [PATCH] Enhancement: exposures/apis/wadl-api.yaml by mp --- exposures/apis/wadl-api.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/exposures/apis/wadl-api.yaml b/exposures/apis/wadl-api.yaml index 897206bfec..d4992f32cb 100644 --- a/exposures/apis/wadl-api.yaml +++ b/exposures/apis/wadl-api.yaml @@ -1,9 +1,14 @@ id: wadl-api info: - name: wadl file disclosure + name: WADL API File Disclosure - Detect author: 0xrudra,manuelbua severity: info + description: WADL API login panel was detected. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cvss-score: 0.0 + cwe-id: CWE-200 reference: - https://github.com/dwisiswant0/wadl-dumper - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ @@ -41,3 +46,5 @@ requests: - "This is simplified WADL with user and core resources only" - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" + +# Enhanced by mp on 2023/02/05