Files
nuclei-templates/http/technologies/microsoft/aspnet-version-detect.yaml
2025-10-26 16:17:37 +00:00

45 lines
1.1 KiB
YAML

id: aspnet-version-detect
info:
name: AspNet Version Disclosure - Detect
author: lucky0x0d,PulseSecurity.co.nz
severity: info
description: |
Detects version disclosed via 'X-AspNet-Version' header.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: "X-AspNet-Version"
tags: tech,detect,aspnet,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/%3f"
stop-at-first-match: true
host-redirects: true
max-redirects: 3
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(tolower(header), "x-aspnet-version")'
- type: regex
part: header
regex:
- '(?i)^X-AspNet-Version:\s*$'
negative: true
extractors:
- type: kval
kval:
- X_AspNet_Version
# digest: 4b0a004830460221009a14bd1a1513a9fa6df7f6568163a9332e42196a687a955b77a1ee8acdcd3323022100c3f54d8eab204de5aaf0e7d11759429032bcbe81ba981b8690d4e83ac0622ed6:922c64590222798bb761d5b6d8e72950