nuclei-templates/http/misconfiguration/mobsf-framework-exposure.yaml

31 lines
712 B
YAML

id: mobsf-framework-exposure
info:
name: MobSF Framework - Exposure
author: Shine
severity: high
metadata:
verified: true
max-request: 1
shodan-query: title:"MobSF"
tags: misconfig,exposure,mobsf
http:
- method: GET
path:
- '{{BaseURL}}/recent_scans/'
matchers-condition: and
matchers:
- type: word
words:
- 'Recent Scans'
- 'Mobile Security Framework - MobSF'
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220202aca4fb5b4d8304046c68d9fc616b30baf3a58cdb00339b9f3a705cfcfaed3022100af39f87785a29aff004bb4547141afa572b26ed97bc2f2a2daf0442b3b75f539:922c64590222798bb761d5b6d8e72950