nuclei-templates/http/misconfiguration/netdisco/netdisco-unauth.yaml

31 lines
942 B
YAML

id: netdisco-unauth
info:
name: Netdisco - Unauth Access
author: ritikchaddha
severity: critical
description: |
Detects an unauth dashboard access of Netdisco.
impact: |
Attackers can potentially exploit this vulnerability to gain unauthorized access to sensitive information.
metadata:
verified: true
max-request: 1
shodan-query: title:"Netdisco"
fofa-query: title="Netdisco"
tags: netdisco,misconfig,unauth
http:
- method: GET
path:
- "{{BaseURL}}/inventory"
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- contains_all(body, "User Management", "/admin/discoverall", "Logged in as")
- status_code == 200
condition: and
# digest: 4b0a00483046022100e4dbd41a46d759c949665130de2b95e55cef8b86a3bd6db888809a03171c0955022100eadd131ef345f268001ee7f5282ebe461685dae085753d2ebf99b806e088188c:922c64590222798bb761d5b6d8e72950