nuclei-templates/http/exposed-panels/1password-scim-panel.yaml

30 lines
816 B
YAML

id: 1password-scim-panel
info:
name: 1Password SCIM Bridge - Panel
author: Splint3r7
severity: info
description: |
1Password SCIM Bridge Login was detected.
classification:
cwe-id: CWE-200
metadata:
max-request: 1
shodan-query: http.title:"1Password SCIM Bridge Login"
tags: panel,1password,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- 'contains_any(body, "1Password SCIM Bridge Login", "scim-bridge-logo")'
- 'status_code == 200'
condition: and
# digest: 4a0a004730450220273efa2c962c1449fec38b3d098131d1a6662c122f71a2546cf4457f462e2fc5022100ec141b841154859bb27c6ad26e87c9a5e934fdf5ad1f71da7d12216d506c96ef:922c64590222798bb761d5b6d8e72950