nuclei-templates/http/misconfiguration/codemeter-webadmin.yaml

37 lines
798 B
YAML

id: codemeter-webadmin
info:
name: CodeMeter Webadmin Dashboard
author: DhiyaneshDk
severity: low
metadata:
verified: true
max-request: 1
shodan-query: html:"CodeMeter"
tags: misconfig,exposure,codemeter
http:
- method: GET
path:
- '{{BaseURL}}/index.html'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WebAdmin | Dashboard'
- 'CodeMeter'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502202181086fce1e777481637c3beb098db460216e0132f225134d0bb08ede625a64022100d654fee93f1b1ed76e63d867f7c581b254a6a729afb840c4c920714f57ce4da5:922c64590222798bb761d5b6d8e72950