Files
nuclei-templates/http/technologies/microstrategy-detect.yaml
2024-12-01 13:57:55 +00:00

57 lines
1.6 KiB
YAML

id: microstrategy-detect
info:
name: MicroStrategy Instances Detection Template
author: philippedelteil,Retr02332
severity: info
description: Detect if MicroStrategy instances exist in your URLS
metadata:
max-request: 16
tags: microstrategy,panel,tech
http:
- method: GET
path:
- "{{BaseURL}}/{{path}}"
payloads:
path:
- MicroStrategy/servlet/mstrWebAdmin/
- MicroStrategy/servlet/mstrWebAdmin
- MicroStrategy/servlet/taskProc/
- MicroStrategy/servlet/taskProc
- MicroStrategy/servlet/mstrWeb/
- MicroStrategy/servlet/mstrWeb
- MicroStrategy/
- MicroStrategy
- servlet/mstrWebAdmin/
- servlet/mstrWebAdmin
- servlet/taskProc/
- servlet/taskProc
- servlet/mstrWeb/
- servlet/mstrWeb
- asp/Main.aspx
- MicroStrategy/asp
stop-at-first-match: true
matchers:
- type: dsl
condition: or
dsl:
- 'contains(body, "MicroStrategy, Incorporated.")'
- 'contains(body, "microstrategy.servletName")'
- 'contains(body, "mstrHiddenInput")'
extractors:
- type: regex
part: body
group: 1
regex:
- 'ProductHelp/([0-9.A-Z]+)'
- type: regex
part: body
group: 1
regex:
- 'WELCOME. MicroStrategy ([0-9]+)'
# digest: 4b0a00483046022100a39ca14d59320cfaea131622f6cf09499c3b6df307a9c7b5d4972c4a4df1ae880221009b1ca3d90be5b986af2c6950a5c27a68adeb899d0049142decad23422f91f488:922c64590222798bb761d5b6d8e72950