Skip to content

Zenphoto <1.5 Installer - Detect

ID: zenphoto-setup

Severity: critical

Author: pdteam

Tags: misconfig,panel,zenphoto,setup,installer

Zenphoto setup page before version 1.5 is susceptible to sensitive information disclosure due to misconfiguration.

id: zenphoto-setup
info:
name: Zenphoto <1.5 Installer - Detect
author: pdteam
severity: critical
description: Zenphoto setup page before version 1.5 is susceptible to sensitive information disclosure due to misconfiguration.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss-score: 9.4
cwe-id: CWE-284
cpe: cpe:2.3:a:zenphoto:zenphoto:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
shodan-query: title:"Zenphoto install"
product: zenphoto
vendor: zenphoto
tags: misconfig,panel,zenphoto,setup,installer
http:
- method: GET
path:
- '{{BaseURL}}/zp-core/setup/index.php'
- '{{BaseURL}}/zp/zp-core/setup/index.php'
- '{{BaseURL}}/gallery/zp-core/setup/index.php'
- '{{BaseURL}}/zenphoto/zp-core/setup/index.php'
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- Welcome to Zenphoto! This page will set up Zenphoto
# digest: 4a0a00473045022100fb0c8a6e02d1edb29ce5cac0b4d0ed81934756ba942186eb480f33951a77de30022057a0e16664f41775ff461a111c8fd17e1e3a672fa644dc84563e13fba034bb73:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/zenphoto-setup.yaml"

View on Github