nuclei-templates/http/misconfiguration/codemeter-webadmin.yaml

40 lines
958 B
YAML

id: codemeter-webadmin
info:
name: CodeMeter Webadmin Dashboard
author: DhiyaneshDk
severity: low
description: CodeMeter Webadmin Dashboard is exposed.
classification:
cpe: cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: wibu
product: codemeter
shodan-query: html:"CodeMeter"
tags: misconfig,exposure,codemeter
http:
- method: GET
path:
- '{{BaseURL}}/index.html'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WebAdmin | Dashboard'
- 'CodeMeter'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a0046304402203f4cb7a5c40a758ae383c5a8aaaeaaa2127d494fe8f118459323c35b2ccb99cc0220261f3760636888994737fe4769aac031978b9db5f3d0ad9c42cb0ab76c3fe168:922c64590222798bb761d5b6d8e72950