nuclei-templates/http/misconfiguration/installer/subrion-installer.yaml

34 lines
881 B
YAML

id: subrion-installer
info:
name: Subrion CMS Web Installer - Exposure
author: ritikchaddha
severity: high
description: |
Subrion CMS Web Installer has been exposed.
reference:
- https://github.com/intelliants/subrion
metadata:
verified: true
max-request: 1
fofa-query: title="Subrion CMS Web Installer"
tags: subrion,cms,install,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/install/"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Subrion CMS Web Installer"
- "Installation wizard"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100c21c25939a762dba12a071f9f6000af22a6b8640ceae95652a27810df62cb5850221009e24a5b294bc966e32cfda4cc151aaa159d927756b0d610b0933fa147e2832ea:922c64590222798bb761d5b6d8e72950