nuclei-templates/http/exposed-panels/ruckus-unleashed-panel.yaml

48 lines
1.3 KiB
YAML

id: ruckus-unleashed-panel
info:
name: Ruckus Wireless Unleashed Login Panel - Detect
author: idealphase
severity: info
description: Ruckus Wireless Unleashed login panel was detected.
reference:
- https://www.commscope.com/ruckus/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ruckuswireless
product: unleashed_firmware
shodan-query:
- http.title:"Unleashed Login"
- http.title:"unleashed login"
google-query:
- intitle:"Unleashed Login"
- intitle:"unleashed login"
fofa-query: title="unleashed login"
tags: panel,ruckus,ruckuswireless
http:
- method: GET
path:
- "{{BaseURL}}/admin/login.jsp"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Unleashed Login</title>"
- type: status
status:
- 200
extractors:
- type: regex
group: 1
regex:
- '<link href="css\/font-awesome\.min\.css\?(.+)" rel="stylesheet">'
# digest: 4a0a0047304502210088fca193dbd4a0bf2a5ca5f4330845bb45bd40f4c0c97f0f7489b2aaa0ad10b9022065783d38c5b7f095ce55da3dda505f47449ec9e3a925243597d5f21c00e49342:922c64590222798bb761d5b6d8e72950