nuclei-templates/http/exposed-panels/graylog-panel.yaml

33 lines
854 B
YAML
Raw Normal View History

2024-03-08 16:50:57 +00:00
id: graylog-panel
info:
name: Graylog Login Panel - Detect
author: righettod
severity: info
2024-03-08 16:57:54 +00:00
description: |
Graylog login panel was detected.
2024-03-08 16:50:57 +00:00
reference:
- https://graylog.org/
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
2024-03-08 16:50:57 +00:00
metadata:
verified: true
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: graylog
2024-09-10 09:08:16 +00:00
product: graylog
shodan-query: http.title:"Graylog Web Interface"
2024-03-08 16:50:57 +00:00
tags: panel,graylog,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "<title>Graylog Web Interface")'
2024-03-08 16:57:54 +00:00
condition: and
2024-09-10 09:08:16 +00:00
# digest: 4a0a004730450221008f995ce3c7b298c705668fcac73cd8f3957aa6dd1ac1b0200169f67e781137d40220035b58544c2f27fdd5ed1f00737a58e28617c983fd66692a878f750a77212494:922c64590222798bb761d5b6d8e72950