nuclei-templates/http/technologies/microsoft/aspnet-version-detect.yaml

36 lines
926 B
YAML
Raw Normal View History

2024-03-15 13:43:50 +00:00
id: aspnet-version-detect
info:
name: AspNet Version Disclosure - Detect
author: lucky0x0d,PulseSecurity.co.nz
severity: info
description: |
Detects version disclosed via 'X-AspNet-Version' header.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: "X-AspNet-Version"
tags: tech,detect,aspnet
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 3
matchers:
- type: dsl
dsl:
- 'contains(tolower(header), "x-aspnet-version")'
extractors:
- type: kval
kval:
- X_AspNet_Version
# digest: 4b0a00483046022100dad22bf762e3dc46dba882804cdf41b02014fea00fe0a951845acbe6c3d138490221008ea9e3a1a77a748ef7e6fc1ef736795b1afc129d64c5751d9733f3734b48682c:922c64590222798bb761d5b6d8e72950