Files
nuclei-templates/http/technologies/caobox-cms-detect.yaml
2025-08-15 02:00:54 +00:00

44 lines
1.1 KiB
YAML

id: caobox-cms-detect
info:
name: Caobox CMS - Detect
author: Chirag Mistry
severity: info
description: |
Detects instances of Caobox CMS based on unique fingerprints and identifiers.
metadata:
verified: true
shodan-query:
- http.component:"Caobox"
- http.component:"caobox"
- cpe:"cpe:2.3:a:caobox:caobox"
tags: detect,caobox,cms,tech
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
paths:
- "/"
- "/admin/"
- "/index.php"
- "/admin/login.php"
matchers-condition: or
matchers:
- type: word
words:
- "Caobox CMS"
- "powered by Caobox"
- "Welcome to Caobox"
- "Caobox version"
condition: or
- type: regex
regex:
- "(?i)caobox"
- "(?i)caobox\\s+(v[0-9.]+)"
- "(?i)<title>Caobox CMS"
# digest: 490a0046304402202a8f8391602f83592a4ab5b0fd7df1d217d2f0dbf59840d44a486fb27467a26c022037ada18834960940c33ebd1c973963a11963fe98d9c184ead33a84866331ceb5:922c64590222798bb761d5b6d8e72950