Skip to content

Alfresco CMS Detection

ID: alfresco-detect

Severity: info

Author: pathtaga

Tags: alfresco,tech,panel

Alfresco CMS was discovered.

id: alfresco-detect
info:
name: Alfresco CMS Detection
author: pathtaga
severity: info
description: Alfresco CMS was discovered.
reference:
- https://www.alfresco.com/
classification:
cwe-id: CWE-200
cpe: cpe:2.3:a:alfresco:alfresco:*:*:*:*:android:*:*:*
metadata:
max-request: 1
vendor: alfresco
product: alfresco
tags: alfresco,tech,panel
http:
- method: GET
path:
- "{{BaseURL}}/alfresco/api/-default-/public/cmis/versions/1.1/atom"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'org\/alfresco\/api\/opencmis\/OpenCMIS.get'
- type: word
part: header
words:
- "application/json"
extractors:
- type: regex
part: body
group: 1
regex:
- 'Enterprise v.*([0-9]\.[0-9]+\.[0-9]+)'
- 'Community v.*([0-9]\.[0-9]+\.[0-9]+)'
- 'Community Early Access v.*([0-9]\.[0-9]+\.[0-9]+)'
# digest: 4a0a004730450221009a028b6fd4e0c8d797ee23a1bb0d2d8f42bba81efc6b21d83ea56b8836b799d60220630e84ab98785384bb974eb752014f7a761756ce1f515f704ddc05756c7da6cc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/alfresco-detect.yaml"

View on Github