nuclei-templates/http/exposed-panels/mylittleadmin-panel.yaml

35 lines
990 B
YAML

id: mylittleadmin-panel
info:
name: myLittleAdmin Login Panel - Detect
author: nullfuzz
severity: info
description: |
myLittleAdmin login panel was detected.
reference:
- http://mylittleadmin.com/en/overview.aspx
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 2
shodan-query: http.html:"myLittleAdmin"
tags: panel,mylittleadmin,login
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/mylittleadmin/"
stop-at-first-match: true
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains(body, '<title>myLittleAdmin for SQL Server')"
condition: and
# digest: 490a0046304402202d7eac42265bfab61a6a2e5dd7579618b1401adfd5a49f12b9426d70151ddea50220239290835151a2f3417710840fcb62aaff6d040eef82f36b002c4076e3a1d4f0:922c64590222798bb761d5b6d8e72950