nuclei-templates/http/misconfiguration/installer/projectsend-installer.yaml

39 lines
1.0 KiB
YAML

id: projectsend-installer
info:
name: ProjectSend Installation Page - Exposure
author: DhiyaneshDK
severity: high
description: |
Detects exposed ProjectSend installation page.
reference:
- https://www.projectsend.org/
metadata:
verified: true
max-request: 1
shodan-query: html:"ProjectSend setup"
product: projectsend
vendor: projectsend
tags: misconfig,install,exposure,projectsend
classification:
cpe: cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- "{{BaseURL}}/install/index.php"
- "{{BaseURL}}/install/make-config.php"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Install » ProjectSend"
- type: status
status:
- 200
# digest: 490a00463044022041d7f7b7fc7194bc9ecab9aec4682b69587b2a03b9dcebf694cfd9e85688754202206bdf942b3342aebf617db7fabc9e276da0cebb2f27a5e585310e85b9ac04210f:922c64590222798bb761d5b6d8e72950