nuclei-templates/technologies/jellyfin-detect.yaml

25 lines
605 B
YAML
Raw Normal View History

2021-04-01 22:32:59 +00:00
id: jellyfin-detect
info:
name: Jellyfin detected
author: dwisiswant0
severity: info
requests:
- method: GET
path:
- "{{BaseURL}}/home.html"
- "{{BaseURL}}/web/home.html"
- "{{BaseURL}}/index.html"
- "{{BaseURL}}/web/index.html"
matchers-condition: and
matchers:
- type: word
words:
- "name=\"application-name\" content=\"Jellyfin\""
- "class=\"page homePage libraryPage allLibraryPage backdropPage pageWithAbsoluteTabs withTabs\""
condition: or
part: body
- type: status
status:
- 200