Skip to content

Lvmeng - UTS Disclosure

ID: lvmeng-uts-disclosure

Severity: high

Author: pikpikcu

Tags: config,exposure

Lvmeng UTS was discovered.

id: lvmeng-uts-disclosure
info:
name: Lvmeng - UTS Disclosure
author: pikpikcu
severity: high
description: Lvmeng UTS was discovered.
metadata:
max-request: 1
tags: config,exposure
http:
- method: GET
path:
- "{{BaseURL}}/webapi/v1/system/accountmanage/account"
headers:
Content-Type: application/json
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "application/json"
condition: and
part: header
- type: word
words:
- "password"
- "nsfocus_uts"
- "MANAGER_IP"
condition: and
part: body
# digest: 4a0a00473045022070a40e46831bec5a48fcbeabd62d7561b0aaea0b96cde5a4060cf4597de5511b022100f0ed57739b3a87431d78b4b6c04536182415013071277f2ed8289828796f2544:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/lvmeng-uts-disclosure.yaml"

View on Github