Update and rename x-aspnet-version-disclosure.yaml to x-aspnet-version-detect.yaml

patch-1
Ritik Chaddha 2024-03-15 19:05:20 +05:30 committed by GitHub
parent 5d478d5e10
commit 1f8dcf63a9
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 10 additions and 10 deletions

View File

@ -1,17 +1,20 @@
id: AspNet-Version-disclosure
id: x-aspnet-version-detect
info:
name: AspNet-Version-disclosure
name: AspNet Version Disclosure - Detect
author: lucky0x0d,PulseSecurity.co.nz
severity: info
description: |
Detects version disclosed via X-AspNet-Version: header
tags: technology, detection, tech-detect
metadata:
max-request: 1
Detects version disclosed via 'X-AspNet-Version' header.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
metadata:
max-request: 1
verified: true
shodan-query: "X-AspNet-Version"
tags: tech,detect,aspnet
http:
- method: GET
@ -21,13 +24,10 @@ http:
host-redirects: true
max-redirects: 3
matchers-condition: or
matchers:
- type: dsl
dsl:
- "regex('(?i)X-AspNet-Version', header)"
- "status_code != 301 && status_code != 302"
condition: and
- 'contains(tolower(header), "x-aspnet-version")'
extractors:
- type: kval