Files
nuclei-templates/http/technologies/caobox-cms-detect.yaml
2025-10-26 16:17:37 +00:00

44 lines
1.1 KiB
YAML

id: caobox-cms-detect
info:
name: Caobox CMS - Detect
author: Chirag Mistry
severity: info
description: |
Detects instances of Caobox CMS based on unique fingerprints and identifiers.
metadata:
verified: true
shodan-query:
- http.component:"Caobox"
- http.component:"caobox"
- cpe:"cpe:2.3:a:caobox:caobox"
tags: detect,caobox,cms,tech,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
paths:
- "/"
- "/admin/"
- "/index.php"
- "/admin/login.php"
matchers-condition: or
matchers:
- type: word
words:
- "Caobox CMS"
- "powered by Caobox"
- "Welcome to Caobox"
- "Caobox version"
condition: or
- type: regex
regex:
- "(?i)caobox"
- "(?i)caobox\\s+(v[0-9.]+)"
- "(?i)<title>Caobox CMS"
# digest: 490a0046304402206f968747e18ca33b8286bf4fe24443cb2d4bccab6fb7b25624602a7ae9c09ee80220572bee00644c8d7f3b605d9381f5f8734ec28d276373c12338dda1c10b1b1c97:922c64590222798bb761d5b6d8e72950