nuclei-templates/http/misconfiguration/installer/vironeer-installer.yaml

29 lines
796 B
YAML

id: vironeer-installer
info:
name: Vironeer Installer - Exposure
author: DhiyaneshDk
severity: high
description: Vironeer is susceptible to the Installation page exposure due to misconfiguration.
metadata:
verified: true
max-request: 1
fofa-query: icon_hash="1315386913"
tags: misconfig,vironeer,install,exposure
http:
- method: GET
path:
- '{{BaseURL}}/install/information/database'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Vironeer Installer'
- type: status
status:
- 200
# digest: 490a0046304402200d21c1038a7fd1ea6238ffaf8c7324b7dfa82d9e71ad54b107e89751c2ec0c1a02206bc674979633b0aa1d5afaf15e76b9ee6fa1f579d0b38d98ef2bf41d7c45c740:922c64590222798bb761d5b6d8e72950