nuclei-templates/http/misconfiguration/tasmota-config-webui.yaml

49 lines
1.2 KiB
YAML

id: tasmota-config-webui
info:
name: Tasmota Configuration Exposure
author: ritikchaddha
severity: medium
description: Tasmota configuration is exposed.
reference:
- https://github.com/arendst/Tasmota
classification:
cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: tasmota_project
product: tasmota
shodan-query: title:"Tasmota"
tags: misconfig,tasmota,exposure,config
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: or
matchers:
- type: word
part: body
words:
- "Firmware"
- "Tasmota"
condition: and
case-insensitive: true
- type: word
part: body
words:
- "Theo Arends"
- "<h2>Tasmota</h2>"
condition: and
case-insensitive: true
extractors:
- type: regex
part: body
group: 1
regex:
- "Tasmota ([0-9.]+) "
# digest: 4b0a00483046022100fd3febc1d7533f97a030d372a8c2b5e7395abeef86f21ac6c49006f69d1999d10221009350ae985ca1ad3810450022455506d42fbbb98685c73e885544d2c4eea9b07f:922c64590222798bb761d5b6d8e72950