nuclei-templates/http/misconfiguration/installer/mantisbt-installer.yaml

39 lines
1.0 KiB
YAML

id: mantisbt-installer
info:
name: MantisBT Installation Exposure
author: DhiyaneshDK
severity: high
description: MantisBT is susceptible to the Installation page exposure due to misconfiguration.
metadata:
verified: true
max-request: 1
shodan-query: html:"Administration - Installation - MantisBT"
product: mantisbt
vendor: mantisbt
tags: misconfig,mantisbt,install,exposure
classification:
cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- '{{BaseURL}}/admin/install.php'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Administration - Installation - MantisBT"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4b0a00483046022100f03dac0390a5cb48ae9d1386bd16e63bd76795f5a5e14f08d8f097ed500ecb9702210089aa21e8714f6796a62c21441b792faa970441fbac2971677497d68a1f349247:922c64590222798bb761d5b6d8e72950