nuclei-templates/http/misconfiguration/sentinel-license-monitor.yaml

34 lines
884 B
YAML

id: sentinel-license-monitor
info:
name: Sentinel License Monitor - Detect
author: DhiyaneshDk
severity: unknown
classification:
cpe: cpe:2.3:a:trioniclabs:sentinel:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: trioniclabs
product: sentinel
shodan-query: html:"Sentinel License Monitor"
tags: misconfig,sentinel,license,monitor
http:
- method: GET
path:
- "{{BaseURL}}/keyinfo.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Sentinel License Monitor"
- "Licenses-in-use"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402204d84d47c838b98983db2f5fa602410f629cf7707d45cdb77bb2bc4e63511b34602203e7e81e925d3c21e5687d551f658a3f111de6bac8f4efd79911e0ea4d9b6fb81:922c64590222798bb761d5b6d8e72950