nuclei-templates/http/exposed-panels/tomcat/tomcat-exposed.yaml

51 lines
1.4 KiB
YAML

id: tomcat-exposed
info:
name: Tomcat Exposed - Detect
author: Podalirius,righettod
severity: info
description: An Apache Tomcat instance was detected.
classification:
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
vendor: apache
product: tomcat
shodan-query:
- title:"Apache Tomcat"
- http.title:"apache tomcat"
- http.html:"apache tomcat"
- cpe:"cpe:2.3:a:apache:tomcat"
fofa-query:
- body="apache tomcat"
- title="apache tomcat"
google-query: intitle:"apache tomcat"
tags: tomcat,panel,apache,detect
http:
- method: GET
path:
- '{{BaseURL}}/host-manager/html'
- '{{BaseURL}}/manager/status'
- '{{BaseURL}}/manager/html'
- '{{BaseURL}}/docs/'
- '{{BaseURL}}/examples/'
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200 || status_code == 401'
- 'contains_any(to_lower(body), "apache tomcat", "tomcat-users.xml")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- 'Version\s+([0-9.]+),'
- '(?i)/lib/([a-z0-9.]+)/webapps'
- '(?i)<h3>Apache\s+Tomcat/([0-9.]+)'
# digest: 4a0a0047304502202fb2b2a75362e8229a4108b0e1775c34d967a9d09b59c47974b10ce4b6ddfbb0022100a592295b994b952182db3f57817bd0baec02b17f18c542d6814631085a43c7a9:922c64590222798bb761d5b6d8e72950