nuclei-templates/http/exposed-panels/mylittleadmin-panel.yaml

35 lines
990 B
YAML

id: mylittleadmin-panel
info:
name: myLittleAdmin Login Panel - Detect
author: nullfuzz
severity: info
description: |
myLittleAdmin login panel was detected.
reference:
- http://mylittleadmin.com/en/overview.aspx
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 2
shodan-query: http.html:"myLittleAdmin"
tags: panel,mylittleadmin,login
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/mylittleadmin/"
stop-at-first-match: true
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains(body, '<title>myLittleAdmin for SQL Server')"
condition: and
# digest: 490a0046304402203eb610cf5c0248217e09f040f85c8078db3fa138c93b8e84646c3c7952ec90730220335d10dd4f2727eb0b0a5b5578554e6ac4865e79498d59bdb323933149372e94:922c64590222798bb761d5b6d8e72950