nuclei-templates/http/technologies/bamboo-detect.yaml

38 lines
1.0 KiB
YAML

id: bamboo-detect
info:
name: Bamboo - Detection
author: bhutch
severity: info
description: |
Detect the presence of Bamboo, a CI/CD tool.
classification:
cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
product: bamboo
shodan-query: http.favicon.hash:-1379982221
category: devops
tags: tech,bamboo,atlassian,detect,cicd
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
matchers:
- type: dsl
dsl:
- contains(to_lower(body), "<title>log into atlassian - atlassian bamboo</title>")
- contains(to_lower(body), "meta name=\"application-name\" content=\"bamboo\" />")
extractors:
- type: regex
name: version
group: 1
regex:
- '(?i)atlassian bamboo</a> version (.*) -'
# digest: 4a0a0047304502205c048685c0bc051c5233102b49cfaf624e7abea52bde0b919c7ec95331d84667022100dd5dddd2367642a3577f2103bbd8a67cd689b85bc6d6eb1ae0fa7b41795ca53e:922c64590222798bb761d5b6d8e72950