nuclei-templates/http/misconfiguration/changedetection-unauth.yaml

33 lines
831 B
YAML

id: changedetection-unauth
info:
name: Changedetection.io Dashboard - Exposure
author: ritikchaddha
severity: medium
description: |
Changedetection.io unauth panel detected.
metadata:
verified: true
max-request: 1
shodan-query: html:"Change Detection"
tags: changedetection,unauth,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SETTINGS</a>'
- 'Change Detection'
condition: and
case-insensitive: true
- type: status
status:
- 200
# digest: 4b0a00483046022100f4b0ac9c92eab0ea4d6fe36f3ec453a9b691a2148aafe9f281e9f6efaa1321b7022100c1e4e18be5f9c2ee3252c843294e680b6f1db68a590357408673dc56d9115085:922c64590222798bb761d5b6d8e72950