Files
nuclei-templates/http/technologies/caobox-cms-detect.yaml
2025-09-24 11:03:10 +00:00

44 lines
1.1 KiB
YAML

id: caobox-cms-detect
info:
name: Caobox CMS - Detect
author: Chirag Mistry
severity: info
description: |
Detects instances of Caobox CMS based on unique fingerprints and identifiers.
metadata:
verified: true
shodan-query:
- http.component:"Caobox"
- http.component:"caobox"
- cpe:"cpe:2.3:a:caobox:caobox"
tags: detect,caobox,cms,tech
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
paths:
- "/"
- "/admin/"
- "/index.php"
- "/admin/login.php"
matchers-condition: or
matchers:
- type: word
words:
- "Caobox CMS"
- "powered by Caobox"
- "Welcome to Caobox"
- "Caobox version"
condition: or
- type: regex
regex:
- "(?i)caobox"
- "(?i)caobox\\s+(v[0-9.]+)"
- "(?i)<title>Caobox CMS"
# digest: 4b0a00483046022100d84081d1d105dc7e32dbf668c083c45bc4502760216689e3451aaf52f5b717b6022100dd6b90546114ec157036cd2e7220d6c66bd1cffe1b5d62546c163f641ae2b5a5:922c64590222798bb761d5b6d8e72950