Files
nuclei-templates/http/technologies/microsoft/aspnet-version-detect.yaml
2025-06-02 16:44:50 +00:00

45 lines
1.1 KiB
YAML

id: aspnet-version-detect
info:
name: AspNet Version Disclosure - Detect
author: lucky0x0d,PulseSecurity.co.nz
severity: info
description: |
Detects version disclosed via 'X-AspNet-Version' header.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: "X-AspNet-Version"
tags: tech,detect,aspnet
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/%3f"
stop-at-first-match: true
host-redirects: true
max-redirects: 3
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(tolower(header), "x-aspnet-version")'
- type: regex
part: header
regex:
- '(?i)^X-AspNet-Version:\s*$'
negative: true
extractors:
- type: kval
kval:
- X_AspNet_Version
# digest: 4a0a00473045022100f52d08ef8190ca2133be42a4c491addbc18c35ec62825cac01c6d7a2b2216a220220774f61a6528e789bf35f9d5ed72cd727b7a4531a2a96ac2575b01b5317d1cbc7:922c64590222798bb761d5b6d8e72950