nuclei-templates/http/exposures/configs/filestash-admin-config.yaml

36 lines
1004 B
YAML

id: filestash-admin-config
info:
name: Filestash Admin Password Configuration
author: DhiyaneshDK
severity: high
description: |
Filestash is susceptible to the Admin Password Configuration page exposure due to misconfiguration.
classification:
cpe: cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: filestash
product: filestash
shodan-query: html:"<title>Admin Console</title>"
tags: exposure,filestash,config
http:
- method: GET
path:
- "{{BaseURL}}/admin/setup"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Admin Console</title>'
- 'component-loader'
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502205a85eca850380ad8f54a0c46f826cdafc31fdd4715e9e9bedf0cfe34bad23488022100dde07cf99e7df6d85e3488c9e2e919476e91f031d92f290ba0923ecb7460d467:922c64590222798bb761d5b6d8e72950