id: aspnet-version-detect info: name: AspNet Version Disclosure - Detect author: lucky0x0d,PulseSecurity.co.nz severity: info description: | Detects version disclosed via 'X-AspNet-Version' header. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 metadata: verified: true max-request: 1 shodan-query: "X-AspNet-Version" tags: tech,detect,aspnet,discovery http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/%3f" stop-at-first-match: true host-redirects: true max-redirects: 3 matchers-condition: and matchers: - type: dsl dsl: - 'contains(tolower(header), "x-aspnet-version")' - type: regex part: header regex: - '(?i)^X-AspNet-Version:\s*$' negative: true extractors: - type: kval kval: - X_AspNet_Version # digest: 4b0a004830460221009a14bd1a1513a9fa6df7f6568163a9332e42196a687a955b77a1ee8acdcd3323022100c3f54d8eab204de5aaf0e7d11759429032bcbe81ba981b8690d4e83ac0622ed6:922c64590222798bb761d5b6d8e72950