nuclei-templates/http/misconfiguration/mobsf-framework-exposure.yaml

30 lines
755 B
YAML

id: mobsf-framework-exposure
info:
name: MobSF Framework - Exposure
author: Shine
severity: high
description: MobSF Framework is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"MobSF"
tags: misconfig,exposure,mobsf
http:
- method: GET
path:
- '{{BaseURL}}/recent_scans/'
matchers-condition: and
matchers:
- type: word
words:
- 'Recent Scans'
- 'Mobile Security Framework - MobSF'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100c1f8b686be39692a98683cd4d1e9d9da7989bc76c88eabcf9aa3af007077d68c022100dd6b2bc86ab1219f38f81d4dae3f9a166173a4bc71d91c9cf3df8d3338cc4092:922c64590222798bb761d5b6d8e72950