nuclei-templates/http/technologies/confluence-detect.yaml

55 lines
1.3 KiB
YAML

id: confluence-detect
info:
name: Confluence Detect
author: philippedelteil,AdamCrosser
severity: info
description: Allows you to detect Atlassian Confluence instances
metadata:
max-request: 5
vendor: atlassian
product: confluence_server
shodan-query: http.component:"Atlassian Confluence"
category: productivity
tags: tech,confluence,atlassian,detect
http:
- method: GET
path:
- "{{BaseURL}}/dologin.action"
- "{{BaseURL}}"
- "{{BaseURL}}/pages"
- "{{BaseURL}}/confluence"
- "{{BaseURL}}/wiki"
host-redirects: true
stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
part: header
words:
- '-confluence-'
case-insensitive: true
- type: word
part: body
words:
- 'confluence-base-url'
extractors:
- type: regex
name: version
part: body
group: 1
regex:
- '<meta name="ajs-version-number" content="(.*)">'
- 'Atlassian Confluence ([a-z0-9-._]+)'
- type: kval
kval:
- version
# digest: 490a0046304402200128411f944c976e9440bafee35bfe8c3942c31930a9675c5bf626baac7e993e02205051120570199b6afd2e5590fcf302c0396ab2e8797272dc090196d938ef6db5:922c64590222798bb761d5b6d8e72950