nuclei-templates/http/exposed-panels/crush-ftp-login.yaml

42 lines
1.2 KiB
YAML

id: crushftp-login
info:
name: CrushFTP WebInterface Panel - Detect
author: dhiyaneshDK
severity: info
description: CrushFTP WebInterface login panel was detected.
reference:
- https://www.exploit-db.com/ghdb/6591
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: crushftp
product: crushftp
shodan-query: http.html:"crushftp"
fofa-query: body="crushftp"
tags: panel,edb,crushftp,detect
http:
- method: GET
path:
- '{{BaseURL}}/WebInterface/login.html'
matchers-condition: or
matchers:
- type: word
part: body
words:
- '<title>CrushFTP WebInterface</title>'
- '<title>CrushFTP - Login</title>'
- 'src="/WebInterface/Resources/js/crushftp.customize.js"'
condition: or
- type: word
part: header
words:
- 'Server: CrushFTP HTTP Server'
# digest: 4a0a0047304502206e73a66e62d6628d9832298a9a6782b5e9431e5135ca0664fcf7586ff458fa9c022100f667560f2b7bc7746ee145076102a76092fb296ca8b5fd483ae71a2b202cda68:922c64590222798bb761d5b6d8e72950