nuclei-templates/http/misconfiguration/mobsf-framework-exposure.yaml

29 lines
517 B
YAML

id: mobsf-framework-exposure
info:
name: MobSF Framework - Exposure
author: Shine
severity: high
metadata:
max-request: 1
verified: true
shodan-query: title:"MobSF"
tags: misconfig,exposure,mobsf
http:
- method: GET
path:
- '{{BaseURL}}/recent_scans/'
matchers-condition: and
matchers:
- type: word
words:
- 'Recent Scans'
- 'Mobile Security Framework - MobSF'
condition: and
- type: status
status:
- 200