nuclei-templates/http/misconfiguration/ampache-update-exposure.yaml

42 lines
1008 B
YAML

id: ampache-update-exposure
info:
name: Ampache Update Page Exposure
author: ritikchaddha
severity: low
description: Ampache update page is exposed.
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Ampache Update"
product: ampache
vendor: ampache
tags: misconfig,ampache,exposure
classification:
cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- "{{BaseURL}}/update.php"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Ampache Update"
case-insensitive: true
- type: word
part: body
words:
- "No Update Needed"
- "No updates needed"
negative: true
- type: status
status:
- 200
# digest: 4a0a004730450221008c0739e4fd795e10d4e26b6443d2e7aaaca3f7a319581604454da0b81291e1da0220044cbd8795a1b1cae54923ff98d84c81e7d7aceb029169ab143825e7caa870f6:922c64590222798bb761d5b6d8e72950