nuclei-templates/http/misconfiguration/installer/growi-installer.yaml

30 lines
759 B
YAML

id: growi-installer
info:
name: GROWI Installer - Exposure
author: DhiyaneshDk
severity: high
description: |
Checks for the presence of a GROWI Installer.
metadata:
verified: true
max-request: 1
shodan-query: html:"Installer - GROWI"
tags: install,growi,exposure,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/installer"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Installer - GROWI</title>"
- type: status
status:
- 200
# digest: 4b0a00483046022100f65be3a6050ddbda3b9523c2e10b58d2cf48ffbbd21f935a017e14dcc947acf9022100a34f8984e2df5cebba225562822b5b07470f28262216dfd247f81e9729e968a3:922c64590222798bb761d5b6d8e72950