nuclei-templates/http/vulnerabilities/cisco/cucm-username-enumeration.yaml

38 lines
1.1 KiB
YAML

id: cucm-username-enumeration
info:
name: Cisco Unified Call Manager Username Enumeration
author: manasmbellani
severity: medium
description: Cisco Unified Call Manager is vulnerable to username enumeration.
remediation: To mitigate this, enable Contact Search Authentication.
reference:
- https://www.n00py.io/2022/01/unauthenticated-dumping-of-usernames-via-cisco-unified-call-manager-cucm/
metadata:
max-request: 1
tags: cisco,cucm,unauth,enum
http:
- method: GET
path:
- "{{BaseURL}}/cucm-uds/users"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- '<userName>'
- '<lastName>'
- '<phoneNumber>'
condition: and
- type: dsl
dsl:
- contains(tolower(content_type), 'application/xml')
- contains(tolower(content_type), 'text/xml')
condition: or
# digest: 490a0046304402201a99f94650b7263d97b84288dd0551d2678f1fc68e593e0a617da2fc16985fb5022061e75a262b0f1d4b7a1f139b8806b001e270904e1c6a595c413156f3e7b7ca86:922c64590222798bb761d5b6d8e72950