nuclei-templates/http/exposed-panels/servicenow-panel.yaml

47 lines
1.1 KiB
YAML

id: servicenow-panel
info:
name: ServiceNow Login Panel - Detect
author: righettod
severity: info
description: |
ServiceNow Login Panel was detected.
reference:
- https://www.servicenow.com/
classification:
cpe: cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: servicenow
product: servicenow
shodan-query: http.favicon.hash:1701804003
tags: panel,servicenow,login,detect
http:
- method: GET
path:
- '{{BaseURL}}/login.do'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'ServiceNow'
- 'window.NOW.'
- 'NOW.user.userID'
condition: and
case-insensitive: true
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)g_builddate\s+=\s+"([0-9._-]+)"'
# digest: 4b0a0048304602210085dc192396c0538f044211d68ea8c4429ab1993d87a6ca14b2d91a781f6c6cd7022100dbd7e644781eafdc6fdc172ac9c2007eca9821b72f5a5b6f970b0b52e7d1c901:922c64590222798bb761d5b6d8e72950