nuclei-templates/http/misconfiguration/installer/geniusocean-installer.yaml

38 lines
956 B
YAML

id: geniusocean-installer
info:
name: GeniusOcean Installer Exposure
description: GeniusOcean is susceptible to the Installation page exposure due to misconfiguration.
author: DhiyaneshDk
severity: high
metadata:
verified: true
max-request: 1
shodan-query: html:"GeniusOcean Installer"
tags: misconfig,geniusocean,install,exposure
http:
- method: GET
path:
- '{{BaseURL}}/install/?step=1'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'GeniusOcean - Script Installer'
- 'GeniusOcean Installer'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4a0a0047304502204314621327deacbc072a474f8aca863cf8e34025fe85ee5db007fcc577988109022100a0a7b17400f4b7e881c9be5f90223a2c330450c49cfbaadb25eddf8ae99e439f:922c64590222798bb761d5b6d8e72950