nuclei-templates/http/exposed-panels/cisco/cisco-expressway-panel.yaml

39 lines
1.1 KiB
YAML

id: cisco-expressway-panel
info:
name: CISCO Expressway Login Panel - Detect
author: righettod
severity: info
description: |
CISCO Expressway login panel was detected.
reference:
- https://www.cisco.com/c/en/us/products/unified-communications/expressway-series/index.html
classification:
cpe: cpe:2.3:a:cisco:expressway_software:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: cisco
product: expressway_software
shodan-query: html:"Cisco Expressway"
tags: panel,cisco,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "cisco expressway", "cisco expway")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- 'Cisco\s+(?:Expressway|Expway)\s+([A-Za-z\s]+)<\/legend>'
# digest: 4b0a00483046022100f1cf2a349b14620bad8aa2d0d501f600fbdd7feb0862ddb92e4290f2d002ac020221009db2aefa9d8909c68eac69bcac29376e309cd3b4c6f7c19f794e342360bd8854:922c64590222798bb761d5b6d8e72950