HP Officejet Pro([ 0-9A-Za-z]+)<\/title>'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/hpe-system-management-anonymous.yaml:
--------------------------------------------------------------------------------
1 | id: hpe-system-management-anonymous-access
2 |
3 | info:
4 | name: HPE System Management Anonymous Access
5 | author: divya_mudgal
6 | severity: low
7 | tags: hp,unauth
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/chpstrt.php?chppath=Home"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | condition: and
18 | words:
19 | - "username = \"hpsmh_anonymous\";"
20 | - "var host_addr = '"
21 | - "var ip_addr = '"
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/jaeger-ui-dashboard.yaml:
--------------------------------------------------------------------------------
1 | id: jaeger-ui-dashboard
2 |
3 | info:
4 | name: Jaeger UI
5 | author: dhiyaneshDK
6 | severity: low
7 | metadata:
8 | shodan-query: http.title:"Jaeger UI"
9 | tags: misconfig
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/search"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'Jaeger UI'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/jboss-status.yaml:
--------------------------------------------------------------------------------
1 | id: jboss-web-console
2 |
3 | info:
4 | name: JBoss Management Console Server Information
5 | author: dhiyaneshDK
6 | severity: low
7 | reference:
8 | - https://www.exploit-db.com/ghdb/5215
9 | tags: jboss,unauth
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/web-console/ServerInfo.jsp"
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | words:
19 | - "Application Server"
20 | - "Management Console"
21 | condition: and
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/jetty-showcontexts-enable.yaml:
--------------------------------------------------------------------------------
1 | id: jetty-showcontexts-enable
2 |
3 | info:
4 | name: Jetty showContexts Enable in DefaultHandler
5 | author: dhiyaneshDK
6 | severity: low
7 | reference:
8 | - https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jetty-showcontexts-enable.yaml
9 | tags: jetty
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "Contexts known to this server are:"
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/jkstatus-manager.yaml:
--------------------------------------------------------------------------------
1 | id: jkstatus-manager
2 |
3 | info:
4 | name: JK Status Manager
5 | author: pdteam
6 | severity: low
7 | tags: config,status
8 |
9 | requests:
10 | - method: GET
11 | headers:
12 | X-Forwarded-For: "127.0.0.1"
13 | path:
14 | - "{{BaseURL}}/jkstatus/"
15 | matchers:
16 | - type: word
17 | words:
18 | - "JK Status Manager"
19 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/jupyter-ipython-unauth.yaml:
--------------------------------------------------------------------------------
1 | id: jupyter-ipython-unauth
2 |
3 | info:
4 | name: Jupyter ipython Unauth
5 | author: pentest_swissky
6 | severity: critical
7 | description: Unauthenticated access to Jupyter instance
8 | tags: unauth
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}/ipython/tree"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: status
18 | status:
19 | - 200
20 | - type: word
21 | words:
22 | - ipython/static/components
23 | - ipython/kernelspecs
24 | part: body
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/kafka-cruise-control.yaml:
--------------------------------------------------------------------------------
1 | id: kafka-cruise-control
2 |
3 | info:
4 | name: Kafka Cruise Control UI
5 | author: dhiyaneshDK
6 | severity: medium
7 | metadata:
8 | shodan-query: http.title:"Kafka Cruise Control UI"
9 | tags: kafka,misconfig
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}'
15 |
16 | redirects: true
17 | max-redirects: 2
18 | matchers:
19 | - type: word
20 | words:
21 | - 'Kafka Cruise Control UI'
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/kubernetes/kubernetes-resource-report.yaml:
--------------------------------------------------------------------------------
1 | id: kubernetes-resource-report
2 |
3 | info:
4 | name: Detect Overview Kubernetes Resource Report
5 | author: pussycat0x
6 | severity: medium
7 | description: Information Disclosure of Kubernetes Resource Report
8 | tags: kubernetes,exposure
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | part: body
19 | words:
20 | - "Overview - Kubernetes Resource Report"
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/laravel-debug-enabled.yaml:
--------------------------------------------------------------------------------
1 | id: laravel-debug-enabled
2 |
3 | info:
4 | name: Laravel Debug Enabled
5 | author: notsoevilweasel
6 | severity: medium
7 | description: Laravel with APP_DEBUG set to true is prone to show verbose errors.
8 | tags: debug,laravel,misconfig
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}/_ignition/health-check"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | words:
19 | - can_execute_commands
20 |
21 | - type: status
22 | status:
23 | - 200
24 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/laravel-debug-error.yaml:
--------------------------------------------------------------------------------
1 | id: laravel-debug-error
2 |
3 | info:
4 | name: Larvel Debug Method Enabled
5 | author: dhiyaneshDK
6 | severity: medium
7 | tags: debug,laravel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - Whoops! There was an error
19 |
20 | - type: status
21 | status:
22 | - 500
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/linkerd-ssrf-detect.yaml:
--------------------------------------------------------------------------------
1 | id: linkerd-ssrf-detection
2 |
3 | info:
4 | name: Linkerd SSRF detection
5 | author: dudez
6 | severity: high
7 | reference:
8 | - https://twitter.com/nirvana_msu/status/1084144955034165248
9 | tags: ssrf,linkerd,oast
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 | headers:
16 | l5d-dtab: /svc/* => /$/inet/{{interactsh-url}}/443
17 |
18 | matchers:
19 | - type: word
20 | part: interactsh_protocol # Confirms the HTTP Interaction
21 | words:
22 | - "http"
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/manage-engine-ad-search.yaml:
--------------------------------------------------------------------------------
1 | id: manage-engine-ad-search
2 |
3 | info:
4 | name: Manage Engine AD Search
5 | author: PR3R00T
6 | severity: high
7 | description: Manage Engine AD Manager service can be configured to allow anonymous users to browse the AD list remotely.
8 | tags: unauth
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}/ADSearch.cc?methodToCall=search"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: status
18 | status:
19 | - 200
20 | - type: word
21 | words:
22 | - "ManageEngine"
23 | - "ADManager"
24 | condition: and
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/misconfigured-concrete5.yaml:
--------------------------------------------------------------------------------
1 | id: misconfigured-concrete5
2 |
3 | info:
4 | name: Misconfigured Concrete5
5 | author: pdteam
6 | severity: low
7 | tags: misconfig,concrete,cms
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | redirects: true
15 | max-redirects: 2
16 | matchers:
17 | - type: word
18 | part: body
19 | words:
20 | - 'concrete5 has encountered an issue'
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/nginx/nginx-status.yaml:
--------------------------------------------------------------------------------
1 | id: nginx-status
2 |
3 | info:
4 | name: Nginx Status Page
5 | author: dhiyaneshDK
6 | severity: info
7 | tags: misconfig,nginx,status
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/nginx_status"
13 | - "{{BaseURL}}/nginx-status"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Active connections:'
20 |
21 | - type: status
22 | status:
23 | - 200
24 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/nginx/nginx-vhost-traffic-status.yaml:
--------------------------------------------------------------------------------
1 | id: nginx-vhost-traffic-status
2 |
3 | info:
4 | name: Nginx Vhost Traffic Status
5 | author: geeknik
6 | severity: low
7 | reference:
8 | - https://github.com/vozlt/nginx-module-vts
9 | tags: status,nginx,misconfig
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/status"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "Nginx Vhost Traffic Status"
21 | - "Host"
22 | - "Zone"
23 | condition: and
24 | - type: status
25 | status:
26 | - 200
27 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/node-exporter-metrics.yaml:
--------------------------------------------------------------------------------
1 | id: node-exporter-metrics
2 |
3 | info:
4 | name: Detect Node Exporter Metrics
5 | author: pussycat0x
6 | severity: low
7 | description: Information Disclosure of Garbage Collection
8 | tags: node,exposure,debug
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}/metrics"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | part: body
19 | words:
20 | - "node_cooling_device"
21 | - "node_network"
22 | condition: and
23 |
24 | - type: status
25 | status:
26 | - 200
27 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/php-fpm-status.yaml:
--------------------------------------------------------------------------------
1 | id: php-fpm-status
2 |
3 | info:
4 | name: PHP-FPM Status
5 | author: geeknik
6 | severity: info
7 | tags: config
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/status?full"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - 'pool:'
19 | - 'process manager:'
20 | - 'start time:'
21 | - 'pid:'
22 | condition: and
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/prometheus/prometheus-log.yaml:
--------------------------------------------------------------------------------
1 | id: prometheus-log
2 |
3 | info:
4 | name: Exposed Prometheus
5 | author: dhiyaneshDK
6 | severity: low
7 | tags: prometheus
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/prometheus"
13 | - "{{BaseURL}}/actuator/prometheus"
14 |
15 | matchers-condition: and
16 | matchers:
17 | - type: word
18 | words:
19 | - 'gateway_request_total'
20 | - 'logback_events_total'
21 | condition: or
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/rack-mini-profiler.yaml:
--------------------------------------------------------------------------------
1 | id: rack-mini-profiler
2 |
3 | info:
4 | name: rack-mini-profiler environment information disclosure
5 | author: vzamanillo
6 | severity: high
7 | tags: config,debug,rails
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/?pp=env"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - "Rack Environment"
19 |
20 | - type: status
21 | status:
22 | - 200
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/salesforce-aura.yaml:
--------------------------------------------------------------------------------
1 | id: salesforce-aura
2 |
3 | info:
4 | name: Detect the exposure of Salesforce Lightning aura API
5 | author: aaron_costello (@ConspiracyProof)
6 | severity: info
7 | reference:
8 | - https://www.enumerated.de/index/salesforce
9 | tags: aura,unauth,salesforce,exposure
10 |
11 | requests:
12 | - method: POST
13 | path:
14 | - "{{BaseURL}}/aura"
15 | - "{{BaseURL}}/s/sfsites/aura"
16 | - "{{BaseURL}}/sfsites/aura"
17 |
18 | body: "{}"
19 |
20 | matchers:
21 | - type: word
22 | part: body
23 | words:
24 | - 'aura:invalidSession'
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/sap/sap-directory-listing.yaml:
--------------------------------------------------------------------------------
1 | id: sap-directory-listing
2 |
3 | info:
4 | name: SAP Directory Listing
5 | author: dhiyaneshDK
6 | severity: medium
7 | tags: sap,listing,misconfig
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/irj/go/km/navigation/'
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - 'title="~system"'
19 | - 'NetWeaver'
20 | condition: and
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
26 | - type: word
27 | words:
28 | - "text/html"
29 | part: header
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/service-pwd.yaml:
--------------------------------------------------------------------------------
1 | id: service-pwd
2 |
3 | info:
4 | name: Service password file
5 | author: pussycat0x
6 | severity: high
7 | description: Searches for sensitive service.pwd file.
8 | reference:
9 | - https://www.exploit-db.com/ghdb/7256
10 | tags: exposure,listing,service
11 |
12 | requests:
13 | - method: GET
14 | path:
15 | - "{{BaseURL}}/_vti_pvt/service.pwd"
16 |
17 | matchers-condition: and
18 | matchers:
19 | - type: word
20 | words:
21 | - "# -FrontPage-"
22 | part: body
23 |
24 | - type: status
25 | status:
26 | - 200
27 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/sitecore-debug-page.yaml:
--------------------------------------------------------------------------------
1 | id: sitecore-debug-page
2 |
3 | info:
4 | name: SiteCore Debug Page
5 | author: dhiyaneshDK
6 | severity: low
7 | metadata:
8 | shodan-query: http.title:"Welcome to Sitecore"
9 | tags: debug,sitecore
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/sitecore/'"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'extranet\Anonymous'
21 |
22 | - type: status
23 | status:
24 | - 404
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/solr-query-dashboard.yaml:
--------------------------------------------------------------------------------
1 | id: solr-admin-query
2 |
3 | info:
4 | name: Solr Admin Query Page
5 | author: dhiyaneshDK
6 | severity: high
7 | reference:
8 | - https://www.exploit-db.com/ghdb/5856
9 | tags: solr,unauth
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}/admin/'
15 | - '{{BaseURL}}/solr/admin/'
16 |
17 | matchers-condition: and
18 | matchers:
19 | - type: word
20 | words:
21 | - 'Solr admin page'
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/tcpconfig.yaml:
--------------------------------------------------------------------------------
1 | id: tcpconfig
2 |
3 | info:
4 | name: TCP Config Information Exposed
5 | author: dhiyaneshDK
6 | severity: low
7 | reference:
8 | - https://www.exploit-db.com/ghdb/6782
9 | tags: logs,config
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/tcpconfig.html"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "TCP/IP Configuration"
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthenticated-alert-manager.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-alert-manager
2 |
3 | info:
4 | name: Unauthenticated Alert Manager
5 | author: dhiyaneshDK
6 | severity: high
7 | reference:
8 | - https://www.shodan.io/search?query=http.title%3A%22Alertmanager%22
9 | tags: unauth,alertmanager
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/#/alerts"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'Alertmanager'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthenticated-lansweeper.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-lansweeper
2 |
3 | info:
4 | name: Unauthenticated Lansweeper Instance
5 | author: divya_mudgal
6 | severity: high
7 | tags: lansweeper,unauth
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/Default.aspx"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "Main page - Lansweeper"
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthenticated-popup-upload.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-popup-upload
2 |
3 | info:
4 | name: Unauthenticated Popup File Uploader
5 | author: DhiyaneshDk
6 | severity: info
7 | reference:
8 | - https://www.exploit-db.com/ghdb/6671
9 | tags: fileupload,upload
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/RichWidgets/Popup_Upload.aspx"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "Popup Upload"
21 | part: body
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthenticated-prtg.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-prtg
2 |
3 | info:
4 | name: Unauthenticated PRTG Traffic Grapher
5 | author: dhiyaneshDK
6 | severity: high
7 | reference:
8 | - https://www.exploit-db.com/ghdb/5808
9 | tags: config,unauth,prtg
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/sensorlist.htm"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'PRTG Traffic Grapher'
21 | condition: and
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthenticated-tensorboard.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-tensorboard
2 |
3 | info:
4 | name: Unauthenticated Tensorboard by Tensorflow
5 | author: dhiyaneshDk
6 | severity: high
7 | tags: tensorflow,tensorboard,unauth
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/data/plugins_listing'
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - 'scalars'
19 | - 'loading_mechanism'
20 | - 'custom_scalars'
21 | condition: and
22 |
23 | - type: status
24 | status:
25 | - 200
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthorized-hp-printer.yaml:
--------------------------------------------------------------------------------
1 | id: unauthorized-hp-printer
2 |
3 | info:
4 | name: Unauthorized HP Printer
5 | author: pussycat0x
6 | severity: high
7 | tags: hp,iot,unauth
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/SSI/Auth/ip_snmp.htm"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - "HP"
19 | - "SNMP
"
20 | condition: and
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/unauthorized-puppet-node-manager-detect.yaml:
--------------------------------------------------------------------------------
1 | id: unauthorized-puppet-node-manager
2 |
3 | info:
4 | name: Pupet Node Manager
5 | author: pussycat0x
6 | severity: medium
7 | metadata:
8 | fofa-dork: 'app="puppet-Node-Manager"'
9 | tags: node,misconfig
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'Nodes'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/ups-status.yaml:
--------------------------------------------------------------------------------
1 | id: ups-status
2 |
3 | info:
4 | name: Multimon UPS status page
5 | author: dhiyaneshDK
6 | severity: low
7 | reference:
8 | - https://www.exploit-db.com/ghdb/752
9 | tags: logs,status
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/cgi-bin/apcupsd/multimon.cgi"
15 | - "{{BaseURL}}/cgi-bin/multimon.cgi"
16 |
17 | matchers-condition: and
18 | matchers:
19 | - type: word
20 | words:
21 | - "Multimon: UPS Status Page"
22 |
23 | - type: status
24 | status:
25 | - 200
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/viewpoint-system-status.yaml:
--------------------------------------------------------------------------------
1 | id: viewpoint-system-status
2 |
3 | info:
4 | name: ViewPoint System Status
5 | author: dhiyaneshDK
6 | severity: low
7 | reference:
8 | - https://www.shodan.io/search?query=http.title%3A%22ViewPoint+System+Status%22
9 | tags: status,exposures,viewpoint
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}'
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'ViewPoint System Status'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/wamp-server-configuration.yaml:
--------------------------------------------------------------------------------
1 | id: wamp-server-configuration
2 |
3 | info:
4 | name: default-wamp-server-page
5 | author: pussycat0x
6 | severity: medium
7 | description: Wamp default page will expose sensitive configuration and vhosts.
8 | reference: https://www.exploit-db.com/ghdb/6891.
9 | tags: wamp,exposure
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: dsl
19 | dsl:
20 | - 'contains(tolower(body), "wampserver")'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/wamp-xdebug-detect.yaml:
--------------------------------------------------------------------------------
1 | id: wamp-xdebug-detect
2 |
3 | info:
4 | name: WAMP xdebug
5 | author: e_schultze_
6 | severity: info
7 | reference:
8 | - https://github.com/random-robbie/My-Shodan-Scripts/blob/1b01bceecc9be0b74b202f445874920eee48bba5/wamp-xdebug/wamp-xdebug.py
9 | tags: debug,config,wamp
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/?phpinfo=-1"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'xdebug.remote_connect_backOn | On | '
20 | part: body
21 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/wildcard-postmessage.yaml:
--------------------------------------------------------------------------------
1 | id: wildcard-postmessage
2 |
3 | info:
4 | name: Wildcard postMessage detection
5 | author: pdteam
6 | severity: info
7 | reference:
8 | - https://jlajara.gitlab.io/web/2020/06/12/Dom_XSS_PostMessage.html
9 | tags: xss,postmessage
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}'
15 |
16 | matchers:
17 | - type: regex
18 | regex:
19 | - postMessage\([a-zA-Z]+,["']\*["']\)
20 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/misconfiguration/zabbix-error.yaml:
--------------------------------------------------------------------------------
1 | id: zabbix-error
2 |
3 | info:
4 | name: Zabbix Error
5 | author: dhiyaneshDK
6 | severity: info
7 | reference:
8 | - https://www.shodan.io/search?query=http.title%3A%22Warning+%5Brefreshed+every+30+sec.%5D%22
9 | tags: zabbix,misconfig
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}'
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - 'Warning [refreshed every 30 sec.]'
21 |
22 | - type: status
23 | status:
24 | - 200
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/clickhouse-unauth.yaml:
--------------------------------------------------------------------------------
1 | id: clickhouse-unauth
2 |
3 | info:
4 | name: Unauth ClickHouse Disclosure
5 | author: lu4nx
6 | severity: high
7 | tags: network,clickhouse,unauth
8 |
9 | network:
10 | - inputs:
11 | # 0011436c69636b486f75736520636c69656e741508b1a9030007 is header
12 | # 64656661756c74 = default
13 | - data: 0011436c69636b486f75736520636c69656e741508b1a903000764656661756c7400
14 | type: hex
15 |
16 | host:
17 | - "{{Hostname}}"
18 | - "{{Host}}:9000"
19 |
20 | read-size: 100
21 | matchers:
22 | - type: word
23 | words:
24 | - "ClickHouse"
25 | - "UTC"
26 | condition: and
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/detect-rsyncd.yaml:
--------------------------------------------------------------------------------
1 | id: detect-rsyncd
2 |
3 | info:
4 | name: Detect rsyncd
5 | author: vsh00t,geeknik
6 | severity: info
7 | reference:
8 | - https://linux.die.net/man/1/rsync
9 | tags: network,rsyncd
10 |
11 | network:
12 | - inputs:
13 | - data: "?\r\n"
14 |
15 | host:
16 | - "{{Hostname}}"
17 | - "{{Host}}:873"
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "RSYNCD: "
23 | - "ERROR: protocol startup error"
24 | condition: and
25 |
26 | extractors:
27 | - type: regex
28 | regex:
29 | - 'RSYNCD: \d\d.\d'
30 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/expn-mail-detect.yaml:
--------------------------------------------------------------------------------
1 | id: expn-mail-detect
2 |
3 | info:
4 | name: EXPN Mail Server Detect
5 | author: r3dg33k
6 | severity: info
7 | tags: mail,expn,network
8 |
9 | network:
10 | - inputs:
11 | - data: "65686c6f20636865636b746c730a"
12 | type: hex
13 | read-size: 2048
14 |
15 | host:
16 | - "{{Hostname}}"
17 | - "{{Host}}:25"
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "250-EXPN"
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/exposed-redis.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-redis
2 |
3 | info:
4 | name: Redis Unauth Server
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://redis.io/topics/security
9 | tags: network,redis,unauth
10 |
11 | network:
12 | - inputs:
13 | - data: "info\r\nquit\r\n"
14 |
15 | host:
16 | - "{{Hostname}}"
17 | - "{{Host}}:6379"
18 | read-size: 2048
19 |
20 | matchers-condition: and
21 | matchers:
22 | - type: word
23 | words:
24 | - "redis_version"
25 | - type: word
26 | negative: true
27 | words:
28 | - "redis_mode:sentinel"
29 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/exposed-zookeeper.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-zookeeper
2 |
3 | info:
4 | name: ZooKeeper Unauth Server
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://zookeeper.apache.org/security.html
9 | tags: network,zookeeper,unauth
10 |
11 | network:
12 | - inputs:
13 | - data: "envi\r\nquit\r\n"
14 |
15 | host:
16 | - "{{Hostname}}"
17 | - "{{Host}}:2181"
18 | read-size: 2048
19 |
20 | matchers:
21 | - type: word
22 | words:
23 | - "zookeeper.version"
24 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/ftp-default-credentials.yaml:
--------------------------------------------------------------------------------
1 | id: ftp-default-credentials
2 |
3 | info:
4 | name: FTP Service with anonymous Login
5 | author: pussycat0x
6 | severity: info
7 | tags: network,ftp,default-login,service
8 |
9 | network:
10 |
11 | - inputs:
12 | - data: "USER anonymous\r\nPASS anonymous\r\n"
13 | host:
14 | - "{{Hostname}}"
15 | - "{{Host}}:21"
16 |
17 | matchers:
18 | - type: word
19 | words:
20 | - "230"
21 | - "Anonymous user logged in"
22 | condition: and
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/iplanet-imap-detect.yaml:
--------------------------------------------------------------------------------
1 | id: iplanet-imap-detect
2 |
3 | info:
4 | name: iplanet messaging imap protocol
5 | author: pussycat0x
6 | severity: info
7 | metadata:
8 | fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap"
9 | tags: network,imap
10 |
11 | network:
12 | - inputs:
13 | - data: "\n"
14 | host:
15 | - "{{Hostname}}"
16 | - "{{Host}}:110"
17 |
18 | matchers:
19 | - type: word
20 | words:
21 | - "iPlanet Messaging Server"
22 |
23 | extractors:
24 | - type: regex
25 | part: body
26 | regex:
27 | - "iPlanet Messaging Server ([0-9.]+)"
28 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/java-rmi-detect.yaml:
--------------------------------------------------------------------------------
1 | id: java-rmi-detect
2 |
3 | info:
4 | name: Detect Java RMI Protocol
5 | author: F1tz
6 | severity: info
7 | tags: network,rmi,java
8 |
9 | network:
10 | - inputs:
11 | - data: "{{hex_decode('4a524d4900024b')}}"
12 |
13 | host:
14 | - "{{Hostname}}"
15 | read-size: 1024
16 |
17 | matchers:
18 | - type: regex
19 | part: raw
20 | regex:
21 | - "^N\\x00\\x0e(\\d{1,3}\\.){3}\\d{1,3}\\x00\\x00"
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/memcached-stats.yaml:
--------------------------------------------------------------------------------
1 | id: memcached-stats
2 |
3 | info:
4 | name: Memcached stats disclosure
5 | author: pdteam
6 | severity: low
7 | tags: network,memcached
8 |
9 | network:
10 | - inputs:
11 | - data: "stats\r\n\r\nquit\r\n"
12 |
13 | host:
14 | - "{{Hostname}}"
15 | - "{{Host}}:11211"
16 | read-size: 2048
17 |
18 | matchers:
19 | - type: word
20 | words:
21 | - "STAT "
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/mongodb-detect.yaml:
--------------------------------------------------------------------------------
1 | id: mongodb-detect
2 |
3 | info:
4 | name: MongoDB Detection
5 | author: pdteam
6 | severity: info
7 | reference:
8 | - https://github.com/orleven/Tentacle
9 | tags: network,mongodb
10 |
11 | network:
12 | - inputs:
13 | - data: 3a000000a741000000000000d40700000000000061646d696e2e24636d640000000000ffffffff130000001069736d6173746572000100000000
14 | type: hex
15 |
16 | host:
17 | - "{{Hostname}}"
18 | - "{{Host}}:27017"
19 | read-size: 2048
20 |
21 | matchers:
22 | - type: word
23 | words:
24 | - "logicalSessionTimeout"
25 | - "localTime"
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/printers-info-leak.yaml:
--------------------------------------------------------------------------------
1 | id: printers-info-leak
2 |
3 | info:
4 | name: Unauthorized Printer Access
5 | author: pussycat0x
6 | severity: info
7 | reference:
8 | - https://book.hacktricks.xyz/pentesting/9100-pjl
9 | tags: network,iot,printer
10 |
11 | network:
12 | - inputs:
13 | - data: "@PJL INFO STATUS\n"
14 | host:
15 | - "{{Host}}:9100"
16 | matchers:
17 | - type: word
18 | words:
19 | - "CODE="
20 | - "PJL INFO STATUS"
21 | condition: and
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/sap-router.yaml:
--------------------------------------------------------------------------------
1 | id: sap-router
2 |
3 | info:
4 | name: SAPRouter Detection
5 | author: randomstr1ng
6 | severity: info
7 | tags: network,sap
8 |
9 | network:
10 | - inputs:
11 | - data: 57484f415245594f553f0a
12 | type: hex
13 |
14 | host:
15 | - "{{Hostname}}"
16 | - "{{Host}}:3299"
17 | read-size: 1024
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "SAProuter"
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/smb-v1-detection.yaml:
--------------------------------------------------------------------------------
1 | id: smb-v1-detection
2 |
3 | info:
4 | name: SMB-V1 Detection
5 | author: pussycat0x
6 | severity: low
7 | reference:
8 | - https://stealthbits.com/blog/what-is-smbv1-and-why-you-should-disable-it/
9 | tags: network,windows,smb,service
10 |
11 | network:
12 | - inputs:
13 | - data: 00000031ff534d4272000000001845680000000000000000000000000000be2200000100000e00024e54204c4d20302e3132000200
14 | type: hex
15 |
16 | host:
17 | - "{{Hostname}}"
18 | - "{{Host}}:445"
19 |
20 | matchers:
21 | - type: word
22 | words:
23 | - "SMBr"
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/smtp-detection.yaml:
--------------------------------------------------------------------------------
1 | id: smtp-service-detection
2 |
3 | info:
4 | name: SMTP Service Detection
5 | author: pussycat0x
6 | severity: info
7 | tags: network,service,smtp
8 |
9 | network:
10 | - inputs:
11 | - data: "\r\n"
12 | host:
13 | - "{{Hostname}}"
14 | - "{{Host}}:25"
15 | matchers:
16 | - type: word
17 | words:
18 | - "SMTP"
19 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/starttls-mail-detect.yaml:
--------------------------------------------------------------------------------
1 | id: starttls-mail-detect
2 |
3 | info:
4 | name: STARTTLS Mail Server Detect
5 | author: r3dg33k
6 | severity: info
7 | tags: mail,starttls,network
8 |
9 | network:
10 | - inputs:
11 | - data: "65686c6f20636865636b746c730a"
12 | type: hex
13 | read-size: 2048
14 |
15 | host:
16 | - "{{Hostname}}"
17 | - "{{Host}}:25"
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "250-STARTTLS"
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/tidb-native-password.yaml:
--------------------------------------------------------------------------------
1 | id: tidb-native-password
2 |
3 | info:
4 | name: TiDB DB with enabled native password
5 | author: lu4nx
6 | severity: info
7 | description: TiDB is fully compatible with the MySQL 5.7 protocol and the common features and syntax of MySQL 5.7. TiDB instance with enabled native password support prone vulnerable for password brute-force attack.
8 | tags: network,tidb,bruteforce,db
9 |
10 | network:
11 | - host:
12 | - "{{Hostname}}"
13 | - "{{Host}}:4000"
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - "mysql_native_password"
19 | - "TiDB"
20 | condition: and
21 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/totemomail-smtp-detect.yaml:
--------------------------------------------------------------------------------
1 | id: totemomail-smtp-detect
2 |
3 | info:
4 | name: Totemomail SMTP Server Detect
5 | author: princechaddha
6 | severity: info
7 | tags: mail,smtp,network,totemomail
8 |
9 | network:
10 | - inputs:
11 | - data: "\r\n"
12 | read-size: 2048
13 |
14 | host:
15 | - "{{Hostname}}"
16 | - "{{Host}}:25"
17 |
18 | matchers:
19 | - type: word
20 | words:
21 | - "totemomail"
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/unauth-ftp.yaml:
--------------------------------------------------------------------------------
1 | id: unauth-ftp
2 |
3 | info:
4 | name: FTP Anonymous Login
5 | author: C3l3si4n
6 | severity: medium
7 | reference:
8 | - https://tools.ietf.org/html/rfc2577
9 | tags: network,ftp
10 |
11 | network:
12 | - inputs:
13 | - data: "USER anonymous\r\nPASS nuclei\r\n"
14 |
15 | host:
16 | - "{{Host}}:21"
17 | - "{{Hostname}}"
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "Anonymous access allowed,"
23 | part: response
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/vsftpd-detection.yaml:
--------------------------------------------------------------------------------
1 | id: vsftpd-detection
2 |
3 | info:
4 | name: VSFTPD v2.3.4 Backdoor Command Execution
5 | author: pussycat0x
6 | severity: critical
7 | reference:
8 | - https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
9 | tags: network,vsftpd,ftp,backdoor
10 |
11 | network:
12 | - inputs:
13 | - data: "USER anonymous\r\nPASS pussycat0x\r\n"
14 |
15 | host:
16 | - "{{Host}}:21"
17 | - "{{Hostname}}"
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "vsFTPd 2.3.4"
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/network/weblogic-iiop-detect.yaml:
--------------------------------------------------------------------------------
1 | id: weblogic-iiop-detect
2 |
3 | info:
4 | name: Detect Weblogic IIOP Protocol
5 | author: F1tz
6 | severity: info
7 | description: Check IIOP protocol status.
8 | tags: network,weblogic
9 |
10 | network:
11 | - inputs:
12 | - data: "{{hex_decode('47494f50010200030000001700000002000000000000000b4e616d6553657276696365')}}"
13 |
14 | host:
15 | - "{{Hostname}}"
16 | read-size: 1024
17 |
18 | matchers-condition: and
19 | matchers:
20 | - type: word
21 | words:
22 | - "GIOP"
23 | - "weblogic"
24 | condition: and
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/ssl/expired-ssl.yaml:
--------------------------------------------------------------------------------
1 | id: expired-ssl
2 |
3 | info:
4 | name: Expired SSL Certificate
5 | author: pdteam
6 | severity: low
7 | tags: ssl
8 |
9 | ssl:
10 | - address: "{{Host}}:{{Port}}"
11 | matchers:
12 | - type: dsl
13 | dsl:
14 | - "unixtime() > not_after"
15 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/aftership-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: aftership-takeover
2 |
3 | info:
4 | name: Aftership Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Oops.The page you're looking for doesn't exist.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/agilecrm-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: agilecrm-takeover
2 |
3 | info:
4 | name: agilecrm takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Sorry, this page is no longer available.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/aha-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: aha-takeover
2 |
3 | info:
4 | name: Aha Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - There is no portal here ... sending you back to Aha!
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/airee-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: airee-takeover
2 |
3 | info:
4 | name: Airee Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | name: airee
19 | words:
20 | - 'Ошибка 402. Сервис Айри.рф не оплачен'
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/anima-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: anima-takeover
2 |
3 | info:
4 | name: Anima Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "If this is your website and you've just created it, try refreshing in a minute"
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/aws-bucket-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: aws-bucket-takeover
2 |
3 | info:
4 | name: AWS Bucket Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,aws,bucket
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "The specified bucket does not exist"
21 |
22 | - type: dsl
23 | dsl:
24 | - contains(tolower(all_headers), 'x-guploader-uploadid')
25 | negative: true
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/bigcartel-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: bigcartel-takeover
2 |
3 | info:
4 | name: Bigcartel Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "
Oops! We couldn’t find that page.
"
21 |
22 | - type: dsl
23 | dsl:
24 | - '!contains(host,"bigcartel.com")'
25 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/bitbucket-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: bitbucket-takeover
2 |
3 | info:
4 | name: Bitbucket Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "Repository not found"
21 | part: body
22 |
23 | - type: word
24 | words:
25 | - "text/plain"
26 | part: header
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/brightcove-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: brightcove-takeover
2 |
3 | info:
4 | name: brightcove takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 |
18 | - type: word
19 | words:
20 | - 'Error Code: 404
'
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/campaignmonitor.yaml:
--------------------------------------------------------------------------------
1 | id: campaignmonitor-takeover
2 |
3 | info:
4 | name: campaignmonitor takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Trying to access your account?'
20 | - 'or '
20 | - '404 Not Found
'
21 | condition: and
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/feedpress-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: feedpress-takeover
2 |
3 | info:
4 | name: Agilecrm Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'The feed has not been found.'
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/flexbe-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: flexbe-takeover
2 |
3 | info:
4 | name: Flexbe Subdomain Takeover
5 | author: 0x_Akoko
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz/issues/237
9 | - https://help.flexbe.com/domains/
10 | tags: takeover,flexbe
11 |
12 | requests:
13 | - method: GET
14 | path:
15 | - "{{BaseURL}}"
16 |
17 | matchers-condition: and
18 | matchers:
19 | - type: word
20 | condition: and
21 | words:
22 | - "Domain isn't configured"
23 | - "flexbe"
24 |
25 | - type: status
26 | status:
27 | - 404
28 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/flywheel-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: flywheel-takeover
2 |
3 | info:
4 | name: Flywheel Subdomain Takeover
5 | author: smaranchand
6 | severity: high
7 | reference:
8 | - https://smaranchand.com.np/2021/06/flywheel-subdomain-takeover
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 | matchers:
16 | - type: word
17 | words:
18 | - "We're sorry, you've landed on a page that is hosted by Flywheel"
19 | - "Oops! That's not the site
you're looking for.
"
20 | condition: and
21 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/frontify-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: frontify-takeover
2 |
3 | info:
4 | name: frontify takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 404 - Page Not Found
20 | - Oops… looks like you got lost
21 | condition: and
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/gemfury-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: gemfury-takeover
2 |
3 | info:
4 | name: gemfury takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "404: This page could not be found."
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/getresponse-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: getresponse-takeover
2 |
3 | info:
4 | name: getresponse takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'With GetResponse Landing Pages, lead generation has never been easier'
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/ghost-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: ghost-takeover
2 |
3 | info:
4 | name: ghost takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz/issues/89
9 | tags: takeover,ghost
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | part: header
20 | words:
21 | - 'offline.ghost.org'
22 |
23 | - type: status
24 | status:
25 | - 302
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/gitbook-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: gitbook-takeover
2 |
3 | info:
4 | name: gitbook takeover detection
5 | author: philippedelteil
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz/issues/259
9 | - https://hackerone.com/reports/223625
10 | tags: takeover,gitbook
11 |
12 | requests:
13 | - method: GET
14 | path:
15 | - "{{BaseURL}}"
16 |
17 | matchers:
18 | - type: word
19 | words:
20 | - "If you need specifics, here's the error"
21 | - "Domain not found"
22 | condition: and
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/hatenablog-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: hatenablog-takeover
2 |
3 | info:
4 | name: hatenablog takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 404 Blog is not found
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/helpjuice-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: helpjuice-takeover
2 |
3 | info:
4 | name: helpjuice takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - We could not find what you're looking for.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/helprace-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: helprace-takeover
2 |
3 | info:
4 | name: helprace takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 |
18 | - type: word
19 | words:
20 | - "Alias not configured!"
21 | - "Admin of this Helprace account needs to set up domain alias"
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/helpscout-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: helpscout-takeover
2 |
3 | info:
4 | name: helpscout takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 |
18 | - type: word
19 | words:
20 | - "No settings were found for this company:"
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/heroku-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: heroku-takeover
2 |
3 | info:
4 | name: heroku takeover detection
5 | author: 0xPrial,pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,heroku
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "herokucdn.com/error-pages/no-such-app.html"
20 | - "No such app"
21 | condition: and
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/hubspot-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: hubspot-takeover
2 |
3 | info:
4 | name: hubspot takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,hubspot
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "Domain not found"
20 | - "does not exist in our system"
21 | condition: and
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/intercom-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: intercom-takeover
2 |
3 | info:
4 | name: intercom takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,intercom
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Uh oh. That page doesn\’t exist.
'
20 | - 'This page is reserved for artistic dogs.'
21 | condition: and
22 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/jazzhr-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: jazzhr-takeover
2 |
3 | info:
4 | name: jazzhr takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - This account no longer active
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/jetbrains-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: jetbrains-takeover
2 |
3 | info:
4 | name: jetbrains takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,jetbrains
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 | matchers:
16 | - type: word
17 | words:
18 | - is not a registered InCloud YouTrack.
19 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/kinsta-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: kinsta-takeover
2 |
3 | info:
4 | name: kinsta takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - No Site For Domain
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/launchrock-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: launchrock-takeover
2 |
3 | info:
4 | name: launchrock takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - It looks like you may have taken a wrong turn somewhere. Don't worry...it happens to all of us.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/mashery-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: mashery-takeover
2 |
3 | info:
4 | name: mashery takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Unrecognized domain
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/netlify-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: netlify-takeover
2 |
3 | info:
4 | name: netlify takeover detection
5 | author: 0xPrial,pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover,netlify
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers-condition: and
17 | matchers:
18 | - type: word
19 | words:
20 | - "Not found - Request ID:"
21 |
22 | - type: word
23 | words:
24 | - "Netlify"
25 | part: header
26 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/ngrok-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: ngrok-takeover
2 |
3 | info:
4 | name: ngrok takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - ngrok.io not found
20 | - Tunnel *.ngrok.io not found
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/pagewiz-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: pagewiz-takeover
2 |
3 | info:
4 | name: Pagewiz subdomain takeover
5 | author: brabbit10
6 | severity: high
7 | reference:
8 | - https://help.pagewiz.com/hc/en-us/articles/115005391465-Page-URL
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - '404 - Page Not Found'
20 | - 'Start Your New Landing Page Now!'
21 | - 'pagewiz'
22 | condition: and
23 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/pantheon-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: pantheon-takeover
2 |
3 | info:
4 | name: pantheon takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "The gods are wise, but do not know of the site which you seek."
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/pingdom-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: pingdom-takeover
2 |
3 | info:
4 | name: pingdom takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Public Report Not Activated
20 | - This public report page has not been activated by the user
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/proposify-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: proposify-takeover
2 |
3 | info:
4 | name: proposify takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - If you need immediate assistance, please contact Error 404: Page Not Found"
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/teamwork-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: teamwork-takeover
2 |
3 | info:
4 | name: teamwork takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Oops - We didn't find your site.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/tictail-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: tictail-takeover
2 |
3 | info:
4 | name: tictail takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Building a brand of your own?'
20 | - 'to target URL: Please renew your subscription"
25 | negative: true
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/uberflip-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: uberflip-takeover
2 |
3 | info:
4 | name: uberflip takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "Non-hub domain, The URL you've accessed does not provide a hub."
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/uptimerobot-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: uptimerobot-takeover
2 |
3 | info:
4 | name: uptimerobot takeover detection
5 | author: pdteam
6 | severity: low
7 | reference:
8 | - https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/
9 | - https://github.com/EdOverflow/can-i-take-over-xyz/issues/45
10 | tags: takeover
11 |
12 | requests:
13 | - method: GET
14 | path:
15 | - "{{BaseURL}}"
16 |
17 | matchers-condition: and
18 | matchers:
19 | - type: regex
20 | regex:
21 | - "^page not found$"
22 |
23 | - type: status
24 | status:
25 | - 404
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/vend-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: vend-takeover
2 |
3 | info:
4 | name: vend takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Looks like you've traveled too far into cyberspace.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/webflow-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: webflow-takeover
2 |
3 | info:
4 | name: webflow takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - The page you are looking for doesn't exist or has been moved.
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/wishpond-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: wishpond-takeover
2 |
3 | info:
4 | name: wishpond takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - https://www.wishpond.com/404?campaign=true
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/worksites-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: worksites-takeover
2 |
3 | info:
4 | name: worksites takeover detection
5 | author: melbadry9
6 | severity: high
7 | reference:
8 | - https://blog.melbadry9.xyz/dangling-dns/xyz-services/ddns-worksites
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: regex
18 | regex:
19 | - "(?:Company Not Found|you’re looking for doesn’t exist)"
20 |
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/wufoo-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: wufoo-takeover
2 |
3 | info:
4 | name: wufoo takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Profile not found
20 | - Hmmm....something is not right.
21 | condition: and
--------------------------------------------------------------------------------
/web/pocs/nuclei/takeovers/zendesk-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: zendesk-takeover
2 |
3 | info:
4 | name: zendesk takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - this help center no longer exists
--------------------------------------------------------------------------------
/web/pocs/nuclei/vulnerabilities/generic/generic-blind-xxe.yaml:
--------------------------------------------------------------------------------
1 | id: generic-blind-xxe
2 |
3 | info:
4 | name: Generic Blind XXE
5 | author: geeknik
6 | severity: high
7 | tags: xxe,generic,blind
8 |
9 | requests:
10 | - raw:
11 | - |
12 | POST / HTTP/1.1
13 | Host: {{Hostname}}
14 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
15 | Referer: {{BaseURL}}
16 |
17 |
18 |
19 |