nuclei-templates/http/exposed-panels/redmine-panel.yaml

31 lines
842 B
YAML

id: redmine-panel
info:
name: Redmine Login Panel - Detect
author: righettod
severity: info
description: Redmine login panel was detected.
reference:
- https://www.redmine.org/
classification:
cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: redmine
product: redmine
shodan-query: http.html:'content="Redmine'
tags: panel,redmine,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "content=\"Redmine")'
condition: and
# digest: 4b0a00483046022100e3ad0ad4168770bb5d86732d0032c4549b9bbfce7b3c8d28bba481c5965a0af7022100adea55474c187343d4fb7f1a5eb0f00b751095f812d8f3824bef768ad2d38256:922c64590222798bb761d5b6d8e72950