nuclei-templates/http/misconfiguration/changedetection-unauth.yaml

33 lines
636 B
YAML

id: changedetection-unauth
info:
name: Changedetection.io Dashboard - Exposure
author: ritikchaddha
severity: medium
description: |
Changedetection.io unauth panel detected.
metadata:
verified: true
max-request: 1
shodan-query: html:"Change Detection"
tags: changedetection,unauth,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SETTINGS</a>'
- 'Change Detection'
condition: and
case-insensitive: true
- type: status
status:
- 200