nuclei-templates/http/takeovers/agilecrm-takeover.yaml

33 lines
811 B
YAML

id: agilecrm-takeover
info:
name: AgileCRM Takeover Detection
author: pdteam
severity: high
description: agilecrm subdomain takeover was detected.
reference:
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/145
metadata:
max-request: 1
tags: takeover,agilecrm
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: word
words:
- Sorry, this page is no longer available.
extractors:
- type: dsl
dsl:
- "resolve(Host, 'cname')"
# digest: 4a0a0047304502203e5437cdfd4734103ae21b5624d49a86012197e68f1ef22d4c61fd6506d2fd6b02210087c84457ec74570230a4ef789f50de0e6ad5bb3bdc311ddf92f804922863588c:922c64590222798bb761d5b6d8e72950