Files
nuclei-templates/http/misconfiguration/codemeter-webadmin.yaml

40 lines
963 B
YAML

id: codemeter-webadmin
info:
name: CodeMeter Webadmin Dashboard
author: DhiyaneshDk
severity: low
description: CodeMeter Webadmin Dashboard is exposed.
classification:
cpe: cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: wibu
product: codemeter
shodan-query: html:"CodeMeter"
tags: misconfig,exposure,codemeter,vuln
http:
- method: GET
path:
- '{{BaseURL}}/index.html'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WebAdmin | Dashboard'
- 'CodeMeter'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a0046304402201f2ceec757016f7e9231ebe4b6ea2f23a2333a05152c1c917e2e9f51917690b1022005c3c808a98108853ae322b74e7f319e16e3484854ee6474ebda3ef676d2caf1:922c64590222798bb761d5b6d8e72950