nuclei-templates/http/exposed-panels/atlassian-bamboo-panel.yaml

48 lines
1.2 KiB
YAML

id: atlassian-bamboo-panel
info:
name: Atlassian Bamboo Login Panel - Detect
author: righettod
severity: info
description: |
Atlassian Bamboo login panel was detected.
reference:
- https://www.atlassian.com/software/bamboo
classification:
cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
product: bamboo
shodan-query: http.title:"Bamboo"
tags: panel,bamboo,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/userlogin!doDefault.action?os_destination=%2Fstart.action"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Log in as a Bamboo user'
- 'content="Bamboo'
- 'atlassian.bamboo.plugins'
- 'Atlassian Bamboo</a>'
condition: or
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- 'version\s+([0-9A-Za-z\s\.]+)\s+-'
- 'pvpVersion = "([a-z0-9.]+)";'
# digest: 490a0046304402204ea085bb6555290116fe95b19fab03c6aabab30f05d98bbfe0fe3cc2131a8cd902205f800e4f12d07cc10a3eb079912f89573a9c50eca9e30ceb2e5546fd2cd0c299:922c64590222798bb761d5b6d8e72950