nuclei-templates/http/misconfiguration/codemeter-webadmin.yaml

36 lines
850 B
YAML

id: codemeter-webadmin
info:
name: CodeMeter Webadmin Dashboard
author: DhiyaneshDk
severity: low
description: CodeMeter Webadmin Dashboard is exposed.
metadata:
verified: true
max-request: 1
shodan-query: html:"CodeMeter"
tags: misconfig,exposure,codemeter
http:
- method: GET
path:
- '{{BaseURL}}/index.html'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WebAdmin | Dashboard'
- 'CodeMeter'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a004630440220207a4d8416d0eaaaae895ad3ebe6cb609571e0eca805a2752fa911c8b247d3f50220307c9c8a42f0463b53b32bdc4bceb92d7bec6e4285a0e2876d686440fa42009b:922c64590222798bb761d5b6d8e72950