QVidium Management System Exposed
ID: qvidium-management-system-exposed
Severity: medium
Author: tess
Tags: misconfig,qvidium
Description
Section titled “Description”QVidium Management System is Exposed.
YAML Source
Section titled “YAML Source”id: qvidium-management-system-exposed
info: name: QVidium Management System Exposed author: tess severity: medium description: QVidium Management System is Exposed. metadata: verified: true max-request: 1 shodan-query: html:"QVidium Management" tags: misconfig,qvidium
http: - method: GET path: - '{{BaseURL}}'
host-redirects: true max-redirects: 2
matchers-condition: and matchers: - type: word part: body words: - 'QVidium Management' - 'src="/cgi-bin/banner.cgi' condition: and
- type: word part: header words: - 'text/html'
- type: status status: - 200# digest: 4b0a00483046022100e8ac36f969777407e1c50e2e0dcf039a2368c39fe542c0e101e045be6072bc93022100bd6220948d1cde98363dc4d07ad410676041cc0eab9d54c37ace9cb63ece3770:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/misconfiguration/qvidium-management-system-exposed.yaml"