nuclei-templates/http/technologies/devexpress-detect.yaml

30 lines
1004 B
YAML
Raw Normal View History

id: devexpress-detect
info:
name: DevExpress Detect
author: CravateRouge
severity: info
metadata:
max-request: 1
shodan-query: html:"DXR.axd"
description: "Detect DevExpress based on existence of its HTTP handler for serving images, scripts and other resources to the client side"
reference:
- https://github.com/DevExpress/aspnet-security-bestpractices/blob/master/SecurityBestPractices.WebForms/README.md#53-information-exposure-through-source-code
- https://supportcenter.devexpress.com/ticket/details/q311748/dxr-axd-what-is-it-and-how-to-disable-it
tags: devexpress,iis,microsoft,asp,tech
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
max-redirects: 2
matchers:
- type: word
part: body
words:
2023-10-14 11:27:55 +00:00
- "DXR.axd"
# digest: 490a0046304402207d0d186d436006888ed2ac008bf749f0e9ceea5ca1a9c1e06785922736698b7e0220627318c732b562d97957499a31a8288e274a59b561aab29325baa0df2917dc39:922c64590222798bb761d5b6d8e72950