Skip to content

Elgg - Installation

ID: elgg-installer

Severity: high

Author: s4e-io

Tags: install,elgg,exposure,misconfig

Elgg Installation was discovered.

id: elgg-installer
info:
name: Elgg - Installation
author: s4e-io
severity: high
description: Elgg Installation was discovered.
reference:
- https://github.com/elgg/elgg
classification:
cpe: cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: elgg
product: elgg
fofa-query: title="Welcome to Elgg"
tags: install,elgg,exposure,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/install.php"
matchers:
- type: dsl
dsl:
- 'contains_any(body,"Elgg Install : Welcome", "Installing Elgg", "Welcome to Elgg")'
- 'status_code == 200'
condition: and
# digest: 490a0046304402202e3399a98a83facd505c98a22c0c795fcf68dabb547170d9fb40bb75b517900c02204cfaca6a8c8925f859954b146924afb4352a3e5fe3f40612656010307b586afd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/elgg-install.yaml"

View on Github