Skip to content

Repetier Server Dashboard - Unauthenticated

ID: repetier-unauth

Severity: high

Author: ritikchaddha

Tags: repetier,dashboard,unauth,misconfig

Repetier Server Dashboard has been exposed.

id: repetier-unauth
info:
name: Repetier Server Dashboard - Unauthenticated
author: ritikchaddha
severity: high
description: |
Repetier Server Dashboard has been exposed.
classification:
cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: repetier-server
product: repetier-server
shodan-query: title:"Repetier-Server"
fofa-query: title="repetier-server"
tags: repetier,dashboard,unauth,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/#!/printer/Prusa_I3/print"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Global Settings'
- 'Edit Profile'
- 'Logout'
- 'Clear all Messages'
condition: and
- type: status
status:
- 200
# digest: 490a0046304402203fea80e850179985e8c74ce6ca4621410776b9daa524dd7c8fffd7f35701588f02203eaa5a12ed3fd30eff824d7b3e87d6b8c9c23df6242afc9ee603badefb564787:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/repetier-unauth.yaml"

View on Github