id: tomcat-detect info: name: Tomcat Detection author: philippedelteil,dhiyaneshDk,AdamCrosser severity: info description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version. metadata: max-request: 3 vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" tags: tech,tomcat,apache,intrusive http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/{{randstr}}" - "{{BaseURL}}/docs/introduction.html" stop-at-first-match: true matchers-condition: or matchers: - type: dsl dsl: - 'contains(tolower(header), "tomcat")' - type: dsl dsl: - 'contains(tolower(body), "apache tomcat")' - 'contains(tolower(body), "/manager/html")' - 'contains(tolower(body), "/manager/status")' condition: or extractors: - type: regex name: version group: 1 regex: - '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)' # digest: 480a00453043021f33760d1e70615e5a6ea58444271729392d288e1e0d267b7814cee7ddd9e5f402207cb3fb17ae7eb0c9c7cc95de0ba94a79ca0ed5518e5b4b74b34e93e8d952ccb4:922c64590222798bb761d5b6d8e72950