nuclei-templates/http/misconfiguration/installer/subrion-installer.yaml

38 lines
995 B
YAML

id: subrion-installer
info:
name: Subrion CMS Web Installer - Exposure
author: ritikchaddha
severity: high
description: |
Subrion CMS Web Installer has been exposed.
reference:
- https://github.com/intelliants/subrion
classification:
cpe: cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: intelliants
product: subrion
fofa-query: title="Subrion CMS Web Installer"
tags: subrion,cms,install,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/install/"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Subrion CMS Web Installer"
- "Installation wizard"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402204b48414c467b1be1eade7c59b89194e1f711d0bfd3713191d08c059402ea33f202204b195be810bb36848cd436bfeb0312c8518d7889e13b38f4596c6857549b0ebf:922c64590222798bb761d5b6d8e72950