nuclei-templates/technologies/wondercms-detect.yaml

26 lines
419 B
YAML

id: wondercms-detect
info:
name: WonderCMS Detect
author: pikpikcu
severity: info
tags: tech,wondercms
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Powered by WonderCMS"
- "https://www.wondercms.com"
condition: and
- type: status
status:
- 200