diff --git a/http/exposed-panels/atlassian-crowd-panel.yaml b/http/exposed-panels/atlassian-crowd-panel.yaml
index 9ff7221536..10eeb1b28d 100644
--- a/http/exposed-panels/atlassian-crowd-panel.yaml
+++ b/http/exposed-panels/atlassian-crowd-panel.yaml
@@ -2,7 +2,7 @@ id: atlassian-crowd-panel
info:
name: Atlassian Crowd Login Panel
- author: organiccrap
+ author: organiccrap,AdamCrosser
severity: info
description: An Atlassian Crowd login panel was discovered.
reference:
@@ -12,6 +12,9 @@ info:
tags: panel,atlassian
metadata:
max-request: 1
+ vendor: atlassian
+ product: crowd
+ category: sso
http:
- method: GET
@@ -24,4 +27,10 @@ http:
-
Atlassian Crowd - Login
part: body
-# Enhanced by mp on 2022/03/20
+ extractors:
+ - type: regex
+ name: version
+ group: 1
+ regex:
+ - 'value="Version: ([\d.]+)'
+ part: body
diff --git a/http/exposed-panels/grafana-detect.yaml b/http/exposed-panels/grafana-detect.yaml
index 8aa2c08ff4..488fdd1555 100644
--- a/http/exposed-panels/grafana-detect.yaml
+++ b/http/exposed-panels/grafana-detect.yaml
@@ -2,7 +2,7 @@ id: grafana-detect
info:
name: Grafana Login Panel - Detect
- author: organiccrap
+ author: organiccrap,AdamCrosser
severity: info
description: Grafana login panel was detected.
classification:
@@ -12,22 +12,30 @@ info:
metadata:
max-request: 1
shodan-query: title:"Grafana"
- tags: panel,grafana
+ vendor: grafana
+ product: grafana
+ category: devops
+ tags: panel,grafana,detect
http:
- method: GET
path:
- "{{BaseURL}}/login"
+
matchers:
- type: word
+ part: body
words:
- "Grafana"
- part: body
+
extractors:
- type: regex
+ name: version
part: body
group: 1
regex:
- '\"version\"\:\"([0-9.]+)\"}'
-# Enhanced by md on 2022/11/16
+ - type: kval
+ kval:
+ - version
diff --git a/http/technologies/apache/tomcat-detect.yaml b/http/technologies/apache/tomcat-detect.yaml
index f447e2c415..8ba2822eb9 100644
--- a/http/technologies/apache/tomcat-detect.yaml
+++ b/http/technologies/apache/tomcat-detect.yaml
@@ -2,12 +2,14 @@ id: tomcat-detect
info:
name: Tomcat Detection
- author: philippedelteil,dhiyaneshDk
+ author: philippedelteil,dhiyaneshDk,AdamCrosser
severity: info
description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version.
metadata:
max-request: 3
shodan-query: title:"Apache Tomcat"
+ vendor: apache
+ product: tomcat
tags: tech,tomcat,apache
http:
@@ -33,6 +35,7 @@ http:
extractors:
- type: regex
+ name: version
group: 1
regex:
- '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)'
diff --git a/http/technologies/jenkins-detect.yaml b/http/technologies/jenkins-detect.yaml
index 2f795da533..6832efe6c1 100644
--- a/http/technologies/jenkins-detect.yaml
+++ b/http/technologies/jenkins-detect.yaml
@@ -2,7 +2,7 @@ id: jenkins-detect
info:
name: Jenkins Detection
- author: philippdelteil,daffainfo,c-sh0
+ author: philippdelteil,daffainfo,c-sh0,AdamCrosser
severity: info
reference:
- https://www.jenkins.io/doc/book/using/remote-access-api/#RemoteaccessAPI-DetectingJenkinsversion
@@ -11,7 +11,10 @@ info:
metadata:
max-request: 2
shodan-query: http.favicon.hash:81586312
- tags: tech,jenkins
+ vendor: jenkins
+ product: jenkins
+ category: devops
+ tags: tech,jenkins,detect
http:
- method: GET
@@ -36,5 +39,10 @@ http:
extractors:
- type: kval
+ name: version
kval:
- x_jenkins
+
+ - type: kval
+ kval:
+ - version
diff --git a/http/exposed-panels/jira-detect.yaml b/http/technologies/jira-detect.yaml
similarity index 80%
rename from http/exposed-panels/jira-detect.yaml
rename to http/technologies/jira-detect.yaml
index f107baaf14..38b430bbc7 100644
--- a/http/exposed-panels/jira-detect.yaml
+++ b/http/technologies/jira-detect.yaml
@@ -1,17 +1,20 @@
id: jira-detect
info:
- name: Jira Login Panel - Detect
- author: pdteam,philippedelteil
+ name: Jira Detect
+ author: pdteam,philippedelteil,AdamCrosser
severity: info
description: Jira login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
- tags: panel,jira
+ tags: tech,panel,jira,atlassian
metadata:
max-request: 3
+ vendor: atlassian
+ product: jira
+ category: productivity
http:
- method: GET
@@ -34,5 +37,3 @@ http:
group: 1
regex:
- 'title="JiraVersion" value="([0-9.]+)'
-
-# Enhanced by md on 2022/11/21
diff --git a/http/technologies/wordpress-detect.yaml b/http/technologies/wordpress-detect.yaml
index 7e0d692b9b..8f881fac5c 100644
--- a/http/technologies/wordpress-detect.yaml
+++ b/http/technologies/wordpress-detect.yaml
@@ -2,12 +2,15 @@ id: wordpress-detect
info:
name: WordPress Detect
- author: pdteam,daffainfo,ricardomaia,topscoder
+ author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser
severity: info
metadata:
max-request: 4
verified: true
shodan-query: http.component:"WordPress"
+ vendor: wordpress
+ product: wordpress
+ category: cms
tags: tech,wordpress,cms,wp
http:
diff --git a/workflows/jira-workflow.yaml b/workflows/jira-workflow.yaml
index 1d7db71f7f..5e184dcfcd 100644
--- a/workflows/jira-workflow.yaml
+++ b/workflows/jira-workflow.yaml
@@ -6,6 +6,6 @@ info:
description: A simple workflow that runs all Jira related nuclei templates on a given target.
workflows:
- - template: http/exposed-panels/jira-detect.yaml
+ - template: http/technologies/jira-detect.yaml
subtemplates:
- tags: jira
\ No newline at end of file