nuclei-templates/http/exposed-panels/defectdojo-panel.yaml

28 lines
836 B
YAML

id: defectdojo-panel
info:
name: DefectDojo Login Panel - Detect
author: Adam Crosser
severity: info
description: DefectDojo login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:owasp:defectdojo:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"DefectDojo Logo"
product: defectdojo
vendor: owasp
tags: panel,defectdojo
http:
- method: GET
path:
- '{{BaseURL}}/login?next='
matchers:
- type: word
words:
- "<img src=\"/static/dojo/img/logo.png\" alt=\"DefectDojo Logo"
# digest: 4a0a00473045022100c5b9f24b66c1265e01199c330f159f30b746a63b8bfcc78d920c5aef940b160d02206205d871dbfb0deb26eaa451ed2631456cf7515843ce3afeab89a15fda87946f:922c64590222798bb761d5b6d8e72950