24 lines
392 B
YAML
24 lines
392 B
YAML
|
id: yzmcms-detect
|
||
|
|
||
|
info:
|
||
|
name: YzmCMS Detect
|
||
|
author: pikpikcu
|
||
|
severity: info
|
||
|
tags: yzmcms,tech
|
||
|
|
||
|
requests:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- '{{BaseURL}}/admin/index/login.html'
|
||
|
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
|
||
|
- type: word
|
||
|
part: body
|
||
|
words:
|
||
|
- 'Powered By <a href="http://www.yzmcms.com"'
|