nuclei-templates/http/exposed-panels/cyberpanel-panel.yaml

36 lines
928 B
YAML

id: cyberpanel-panel
info:
name: Cyberpanel Login Panel - Detect
author: mailler
severity: info
description: |
Cyberpanel login panel was detected.
reference:
- https://cyberpanel.net/KnowledgeBase/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
max-request: 1
shodan-query: html:"cyberpanel"
fofa-query: app="Cyberpanel"
product: cyberpanel
tags: cyberpanel,panel,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "<title>(.*)CyberPanel(.*)</title>"
- type: status
status:
- 200
# digest: 4a0a004730450221008907aa96c27405c826857b7ef745657707e1e19fbd3ba3dd43a39f946de135a202207caab45a1862b88cf7a747d3dfd54d12af83fe04ab50dac000e131e30c833372:922c64590222798bb761d5b6d8e72950