Skip to content

FacturaScripts Installer Exposure

ID: facturascripts-installer

Severity: high

Author: DhiyaneshDk

Tags: misconfig,facturascripts,install,exposure

FacturaScripts is susceptible to the Installation page exposure due to misconfiguration.

id: facturascripts-installer
info:
name: FacturaScripts Installer Exposure
author: DhiyaneshDk
severity: high
description: FacturaScripts is susceptible to the Installation page exposure due to misconfiguration.
classification:
cpe: cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: facturascripts
product: facturascripts
shodan-query: html:"FacturaScripts installer"
tags: misconfig,facturascripts,install,exposure
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'FacturaScripts installer'
- 'connect to the database'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4a0a0047304502201210aaf72b62c349215510a9e48c6e69622df20927cedc45c0c1d0e0243d9a41022100fddcae6e46e500bb3d772f6518df1a14acbe612c9b15d812018c48b6e282b790:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/facturascripts-installer.yaml"

View on Github