nuclei-templates/http/exposed-panels/arcserve-panel.yaml

38 lines
998 B
YAML

id: arcserve-panel
info:
name: ArcServe Panel - Detect
author: DhiyaneshDk
severity: info
reference:
- https://twitter.com/HunterMapping/status/1674267368359444480
- https://github.com/mdsecactivebreach/CVE-2023-26258-ArcServe
classification:
cpe: cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*
metadata:
fofa-query: icon_hash="-1889244460"
max-request: 1
product: udp
shodan-query: http.favicon.hash:-1889244460
vendor: arcserve
verified: true
tags: panel,login,arcserve,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Arcserve UDP"
- "/arcserve.js"
condition: or
- type: status
status:
- 200
# digest: 4b0a00483046022100f1e920029ab223d47552ebb51dbe68e974dd8b2d064b34d4c511819d6ef5d04d022100f04b08386868b3f6308d464cf43873c86fe31c3302d64bb19cd4967ccbcf9037:922c64590222798bb761d5b6d8e72950