id: tomcat-exposed info: name: Tomcat Exposed - Detect author: Podalirius,righettod severity: info description: An Apache Tomcat instance was detected. classification: cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 1 verified: true vendor: apache product: tomcat shodan-query: - title:"Apache Tomcat" - http.title:"apache tomcat" - http.html:"apache tomcat" - cpe:"cpe:2.3:a:apache:tomcat" fofa-query: - body="apache tomcat" - title="apache tomcat" google-query: intitle:"apache tomcat" tags: tomcat,panel,apache,detect http: - method: GET path: - '{{BaseURL}}/host-manager/html' - '{{BaseURL}}/manager/status' - '{{BaseURL}}/manager/html' - '{{BaseURL}}/docs/' - '{{BaseURL}}/examples/' stop-at-first-match: true matchers: - type: dsl dsl: - 'status_code == 200 || status_code == 401' - 'contains_any(to_lower(body), "apache tomcat", "tomcat-users.xml")' condition: and extractors: - type: regex part: body group: 1 regex: - 'Version\s+([0-9.]+),' - '(?i)/lib/([a-z0-9.]+)/webapps' - '(?i)

Apache\s+Tomcat/([0-9.]+)' # digest: 4a0a0047304502202fb2b2a75362e8229a4108b0e1775c34d967a9d09b59c47974b10ce4b6ddfbb0022100a592295b994b952182db3f57817bd0baec02b17f18c542d6814631085a43c7a9:922c64590222798bb761d5b6d8e72950