Skip to content

zm-system-log-detect

ID: zm-system-log-detect

Severity: low

Author: pussycat0x

Tags: logs,zm,exposure

Zm system log file exposed.

id: zm-system-log-detect
info:
name: zm-system-log-detect
author: pussycat0x
severity: low
description: Zm system log file exposed.
reference: https://www.exploit-db.com/ghdb/6926
metadata:
max-request: 2
tags: logs,zm,exposure
http:
- method: GET
path:
- "{{BaseURL}}/?view=log"
- "{{BaseURL}}/zm/?view=log"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- "<title>ZM - System Log</title>"
- type: status
status:
- 200
# digest: 490a0046304402200cb604ef1d104b1aa2f0728fd2166f03b57972b7a219f36719c21b1f5388866102202645610023ea6f07eec9a679e74cc0f68eb1e9776daa87f8a5fff39554bb9b12:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/logs/zm-system-log-detect.yaml"

View on Github