Skip to content

Chamilo Installer Exposure

ID: chamilo-installer

Severity: high

Author: DhiyaneshDk

Tags: misconfig,chamilo,install,exposure

Chamilo is susceptible to the Installation page exposure due to misconfiguration.

id: chamilo-installer
info:
name: Chamilo Installer Exposure
author: DhiyaneshDk
severity: high
description: Chamilo is susceptible to the Installation page exposure due to misconfiguration.
classification:
cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: chamilo
product: chamilo
shodan-query: title:"Chamilo has not been installed"
tags: misconfig,chamilo,install,exposure
http:
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/main/install/index.php'
stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
part: body
words:
- 'Chamilo installation'
- 'Installation Language'
condition: and
- type: word
part: body
words:
- '<title>Chamilo has not been installed</title>'
# digest: 490a004630440220657dc349fa2eec45573364843842701a6a5de0550daa0256e1850a40fd83972002207bf0b95ecac446880f4c231bd1175d3d1626c513d04e96f97255db23d832c33e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/chamilo-installer.yaml"

View on Github