nuclei-templates/http/technologies/apache/apache-cocoon-detect.yaml

32 lines
575 B
YAML

id: apache-cocoon-detect
info:
name: Apache Cocoon detect
author: ffffffff0x
severity: info
metadata:
max-request: 1
verified: true
shodan-query: http.html:"Apache Cocoon"
fofa-query: app="APACHE-Cocoon"
tags: apache,cocoon,tech
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers:
- type: word
part: header
words:
- "X-Cocoon-Version"
extractors:
- type: regex
part: header
regex:
- 'X\-Cocoon\-Version:([ 0-9.]+)'