nuclei-templates/http/technologies/devexpress-detect.yaml

33 lines
1.1 KiB
YAML

id: devexpress-detect
info:
name: DevExpress - Detect
author: CravateRouge
severity: info
description: |
Detect DevExpress based on the existence of its HTTP handler for serving images, scripts, and other resources to the client side.
reference:
- https://github.com/DevExpress/aspnet-security-bestpractices/blob/master/SecurityBestPractices.WebForms/README.md#53-information-exposure-through-source-code
- https://supportcenter.devexpress.com/ticket/details/q311748/dxr-axd-what-is-it-and-how-to-disable-it
classification:
cpe: cpe:2.3:a:devexpress:devexpress_components:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: devexpress
product: devexpress_components
shodan-query: html:"DXR.axd"
tags: devexpress,iis,microsoft,asp,tech
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
max-redirects: 2
matchers:
- type: word
part: body
words:
- "DXR.axd"
# digest: 4b0a00483046022100c96f894faaf632b1ce45b71b1838093a130f5fa302e44dd2033a1bf33e7d45c5022100d6d42feddf38cf90e2fc0e0b03a13fa22c9396cd7a568d94526b34062750f152:922c64590222798bb761d5b6d8e72950