Files
nuclei-templates/http/misconfiguration/unauthenticated-lansweeper.yaml
2024-12-01 13:57:55 +00:00

21 lines
585 B
YAML

id: unauthenticated-lansweeper
info:
name: Unauthenticated Lansweeper Instance
author: divya_mudgal
severity: high
description: Lansweeper Instance is exposed.
metadata:
max-request: 1
tags: lansweeper,unauth,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/Default.aspx"
matchers:
- type: word
words:
- "Main page - Lansweeper"
# digest: 4b0a00483046022100c7742a28b555584b71949221321b5a249151037f131a80ed1f099c007860abc0022100f5da992eab98142041f838852fe5b2394bfc7793fc8f57b70e4c982662c0e457:922c64590222798bb761d5b6d8e72950