nuclei-templates/http/exposed-panels/graylog-panel.yaml

28 lines
743 B
YAML

id: graylog-panel
info:
name: Graylog Login Panel - Detect
author: righettod
severity: info
description: |
Graylog login panel was detected.
reference:
- https://graylog.org/
metadata:
max-request: 1
shodan-query: http.title:"Graylog Web Interface"
verified: true
tags: panel,graylog,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "<title>Graylog Web Interface")'
condition: and
# digest: 4a0a0047304502206da0f91c3aaeb62413b0832c25fa770d1099530ea51c28f636b407cadca7338b022100d9cf53bbddd4a8e23f5a8d9a15a20edc8d6dbd8963d5bd5a8ab1b51e9dc4d095:922c64590222798bb761d5b6d8e72950