Files
nuclei-templates/http/technologies/odoo-detect.yaml
2025-11-18 20:10:40 +00:00

41 lines
1.0 KiB
YAML

id: odoo-detection
info:
name: Odoo - Detect
author: keyboard-slayer
severity: info
description: |
Detected Odoo by sending an empty JSON POST request to the /web/webclient/version_info endpoint.
reference:
- https://github.com/odoo/odoo/
metadata:
verified: true
max-request: 1
vendor: odoo
product: odoo
tags: tech,odoo,detect,discovery
http:
- raw:
- |
POST /web/webclient/version_info HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/json")'
- 'contains(body, "server_version")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '"server_version":\s*"([^"]+)"'
# digest: 4b0a00483046022100901ae1e3ff507a699e73d09c39642a67058ed48d1a8140099ea33c5818e300ea02210086ae9c0d51f4bf68f81cf8f6f977e33165b4fb348fcf3c378b0319664adeec15:922c64590222798bb761d5b6d8e72950