nuclei-templates/http/exposed-panels/apache/apache-apisix-panel.yaml

44 lines
1.2 KiB
YAML
Raw Normal View History

id: apache-apisix-panel
2021-12-31 01:10:15 +00:00
info:
2024-05-12 07:17:39 +00:00
name: Apache APISIX Login Panel - Detect
2024-05-11 15:44:52 +00:00
author: pikpikcu,righettod
2021-12-31 01:10:15 +00:00
severity: info
description: An Apache APISIX login panel was detected.
classification:
cwe-id: CWE-200
cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*
2021-12-31 01:10:15 +00:00
metadata:
max-request: 1
vendor: apache
product: apisix
fofa-query:
- title="Apache APISIX Dashboard"
- title="apache apisix dashboard"
shodan-query: http.title:"apache apisix dashboard"
google-query: intitle:"apache apisix dashboard"
2024-05-12 07:17:39 +00:00
tags: apache,apisix,panel,login,detect
2021-12-31 01:10:15 +00:00
http:
2021-12-31 01:10:15 +00:00
- method: GET
path:
- "{{BaseURL}}/user/login?redirect=%2F"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Apache APISIX Dashboard</title>'
- type: status
status:
- 200
2024-05-11 15:44:52 +00:00
extractors:
- type: regex
part: header
group: 1
regex:
- '(?i)Server:\s+APISIX\/([0-9.]+)'
# digest: 4a0a00473045022100c1659ae1ee866d323b03f2da39b3ca0cc8602892d49cee03ea606a6a26a9020402203b0aef21ab6728cfc77c4fc523aed949c8ad4e10fad73c8c0bb21ec6b5bb9507:922c64590222798bb761d5b6d8e72950