Skip to content

Ruckus SmartZone Exposed Installation

ID: ruckus-smartzone-install

Severity: high

Author: ritikchaddha

Tags: misconfig,ruckus,smartzone,install

Ruckus SmartZone is susceptible to the Installation page exposure due to misconfiguration.

id: ruckus-smartzone-install
info:
name: Ruckus SmartZone Exposed Installation
author: ritikchaddha
severity: high
description: Ruckus SmartZone is susceptible to the Installation page exposure due to misconfiguration.
metadata:
verified: true
max-request: 1
shodan-query: html:"Welcome to the Ruckus"
tags: misconfig,ruckus,smartzone,install
http:
- method: GET
path:
- "{{BaseURL}}/adminweb/"
matchers-condition: and
matchers:
- type: word
words:
- 'Welcome to the Ruckus'
- 'Setup Wizard'
condition: and
- type: status
status:
- 200
# digest: 490a0046304402205be868cfa702a54f8985935ddfc1f4920e270d3c30ba538a860d866b375e12ef02201c86cd60cde6a4e407cbcdcdafb2e1028153c7766c906a832614f28c8e70e9c8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/ruckus-smartzone-install.yaml"

View on Github