nuclei-templates/http/misconfiguration/request-baskets-exposure.yaml

41 lines
1.0 KiB
YAML

id: request-baskets-exposure
info:
name: Request Baskets - Exposure
author: DhiyaneshDk
severity: low
description: Request Baskets is exposed.
reference:
- https://notes.sjtu.edu.cn/s/MUUhEymt7#
- https://github.com/entr0pie/CVE-2023-27163
classification:
cpe: cpe:2.3:a:rbaskets:request_baskets:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: rbaskets
product: request_baskets
shodan-query: html:"request-baskets"
tags: misconfig,requests-baskets,exposure
http:
- method: GET
path:
- "{{BaseURL}}/web"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Request Baskets</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100d799599a82bcbfc8cf249ccf892be00faefc45e3242b08fc82b53b758a8afb0f0220379fe12b4968a5eb22689f4dcc5cf2c63040c5bc9b55690cf92756a7b2ba14cf:922c64590222798bb761d5b6d8e72950