Files
nuclei-templates/http/technologies/dufs-detect.yaml
2025-10-26 16:17:37 +00:00

36 lines
873 B
YAML

id: dufs-detect
info:
name: DUFS - Detect
author: righettod
severity: info
description: |
DUFS software was detected.
reference:
- https://github.com/sigoden/dufs
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Dufs"
tags: tech,dufs,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_all(to_lower(body), "__dufs_v", "allow_upload")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)__dufs_v([0-9.]+)_'
# digest: 4a0a004730450221008d2becf1e4b4baf6a244e58df2e65dd79e96d1ef37fd2d7c1c1e83920cc99c4a022036f5e9ca511db1600d4d5c5488d91af001aed52fe3c5c92ae6931fd70d17fac6:922c64590222798bb761d5b6d8e72950