nuclei-templates/http/exposed-panels/posteio-admin-panel.yaml

35 lines
914 B
YAML

id: posteio-admin-panel
info:
name: Poste.io Admin Panel - Detect
author: ritikchaddha
severity: info
description: Poste.io login panel was detected.
classification:
cpe: cpe:2.3:a:analogic:poste.io:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: analogic
product: poste.io
shodan-query: title:"Administration login" html:"poste<span"
tags: panel,poste,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/admin/login"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "poste<span"
- "Administration login"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502200f16f967b8be5ede4203902cdb7882e73b1cb17829a3eb1a1e6610191cde2d4f022100886cfd85817ed0d1ee32ba2db17c2c35284ddf734fe927c028ef63d0ad7ab356:922c64590222798bb761d5b6d8e72950