Files
nuclei-templates/http/technologies/caobox-cms-detect.yaml
2025-06-12 12:10:07 +00:00

44 lines
1.1 KiB
YAML

id: caobox-cms-detect
info:
name: Caobox CMS - Detect
author: Chirag Mistry
severity: info
description: |
Detects instances of Caobox CMS based on unique fingerprints and identifiers.
metadata:
verified: true
shodan-query:
- http.component:"Caobox"
- http.component:"caobox"
- cpe:"cpe:2.3:a:caobox:caobox"
tags: detect,caobox,cms,tech
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
paths:
- "/"
- "/admin/"
- "/index.php"
- "/admin/login.php"
matchers-condition: or
matchers:
- type: word
words:
- "Caobox CMS"
- "powered by Caobox"
- "Welcome to Caobox"
- "Caobox version"
condition: or
- type: regex
regex:
- "(?i)caobox"
- "(?i)caobox\\s+(v[0-9.]+)"
- "(?i)<title>Caobox CMS"
# digest: 4a0a0047304502201ca962bdd2c1d786cbeb3e33dab8b20d7a502a704470a38ad8c86d45307cc247022100a87c8dd1998081ca4977bb4a210cc109284bf8b47a8e8a19123af664fdff391c:922c64590222798bb761d5b6d8e72950