Files
nuclei-templates/http/technologies/dufs-detect.yaml
2025-08-15 02:00:54 +00:00

36 lines
895 B
YAML

id: dufs-detect
info:
name: DUFS - Detect
author: righettod
severity: info
description: |
DUFS software was detected.
reference:
- https://github.com/sigoden/dufs
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Dufs"
tags: tech,dufs,detect
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_all(to_lower(body), "__dufs_v", "allow_upload")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)__dufs_v([0-9.]+)_'
# digest: 490a0046304402207a0418b7a840f0723434ccf4f0a3f59e8a26745bf25f7bcd8c6149d61efe2f3d022076ff56600991a1e6851536c8c55392f49b2fb791e771abdbf40c9e5d205575b5:922c64590222798bb761d5b6d8e72950