id: aspnet-version-detect info: name: AspNet Version Disclosure - Detect author: lucky0x0d,PulseSecurity.co.nz severity: info description: | Detects version disclosed via 'X-AspNet-Version' header. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 metadata: verified: true max-request: 1 shodan-query: "X-AspNet-Version" tags: tech,detect,aspnet http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/%3f" stop-at-first-match: true host-redirects: true max-redirects: 3 matchers-condition: and matchers: - type: dsl dsl: - 'contains(tolower(header), "x-aspnet-version")' - type: regex part: header regex: - '(?i)^X-AspNet-Version:\s*$' negative: true extractors: - type: kval kval: - X_AspNet_Version # digest: 4a0a00473045022100f52d08ef8190ca2133be42a4c491addbc18c35ec62825cac01c6d7a2b2216a220220774f61a6528e789bf35f9d5ed72cd727b7a4531a2a96ac2575b01b5317d1cbc7:922c64590222798bb761d5b6d8e72950