nuclei-templates/http/exposed-panels/thruk-panel.yaml

51 lines
1.5 KiB
YAML
Raw Normal View History

id: thruk-panel
info:
name: Thruk Login Panel - Detect
author: ffffffff0x,righettod
severity: info
description: Thruk Monitoring panel was detected.
reference:
- https://thruk.org/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:thruk:thruk:*:*:*:*:*:*:*:*
metadata:
max-request: 6
vendor: thruk
product: thruk
fofa-query:
- title=="Thruk Monitoring Webinterface"
- title=="thruk monitoring webinterface"
- body="thruk"
shodan-query: http.html:"thruk" || http.title:"thruk monitoring webinterface"
tags: thruk,panel,login
http:
- method: GET
path:
2024-11-17 08:57:39 +00:00
- "{{BaseURL}}"
redirects: true
max-redirects: 6
2024-11-17 08:57:39 +00:00
matchers-condition: and
matchers:
2024-11-17 08:57:39 +00:00
- type: dsl
dsl:
- 'contains_any(to_lower(body), "<title>thruk monitoring webinterface", "<title>thruk - monitoring webinterface", "thruk_static_export")'
- 'contains_any(to_lower(header), "x-thruk-auth-key", "thruk_test=")'
condition: or
- type: dsl
dsl:
- 'status_code == 200 || status_code == 401'
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)version_info\s*=\s*.?([a-z0-9./\s.-]+).?'
2024-11-18 05:38:59 +00:00
# digest: 4a0a00473045022016d03fdd13ef6adba741debb5ef4625f9a74fc53227a7068ecc5898ab78132620221009914ad30e6352e940c37b24665379fc7bcb520d1fa8317f69df5dbb5937fb24b:922c64590222798bb761d5b6d8e72950