nuclei-templates/http/misconfiguration/unauth-mautic-upgrade.yaml

36 lines
875 B
YAML

id: unauth-mautic-upgrade
info:
name: Unauthenticated Mautic Upgrade.php Exposure
author: huowuzhao
severity: high
description: Upgrade.php page in Mautic is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"Mautic"
tags: misconfig,unauth,mautic
http:
- method: GET
path:
- '{{BaseURL}}/upgrade.php'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Upgrade Mautic'
- 'Click here to start upgrade'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4a0a00473045022100b1914dfeeca85843e6d766dbeed80833b18c93ecf38741681d2d0f0b0d24786702205a0beedda3bc0f9910637a85349c799117c13baaf8a3490073bb53905593c8d0:922c64590222798bb761d5b6d8e72950