nuclei-templates/http/exposed-panels/amcrest-login.yaml

45 lines
1.1 KiB
YAML

id: amcrest-login
info:
name: Amcrest Login
author: DhiyaneshDK
severity: info
description: An Amcrest LDAP user login was discovered.
reference:
- https://www.exploit-db.com/ghdb/7273
classification:
cwe-id: CWE-200
cpe: cpe:2.3:h:amcrest:ip2m-853ew:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: amcrest
product: ip2m-853ew
shodan-query:
- html:"amcrest"
- http.html:"amcrest" "ldap user"
- http.html:"amcrest"
google-query:
- intext:"amcrest" "LDAP User"
- intext:"amcrest" "ldap user"
fofa-query:
- body="amcrest" "ldap user"
- body="amcrest"
tags: panel,camera,amcrest,edb
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
words:
- "Amcrest Technologies"
- "LDAPUser"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502200f9c0dd609d107a50226fd6f79a5f214c3444c957cc50beda4bced915db7a9fb022100d25051dc82a1d3237125e444204c5cdf2091b0eee8fc732608b63b6d79040e16:922c64590222798bb761d5b6d8e72950