Skip to content

Apache APISIX Login Panel - Detect

ID: apache-apisix-panel

Severity: info

Author: pikpikcu,righettod

Tags: apache,apisix,panel,login,detect

An Apache APISIX login panel was detected.

id: apache-apisix-panel
info:
name: Apache APISIX Login Panel - Detect
author: pikpikcu,righettod
severity: info
description: An Apache APISIX login panel was detected.
classification:
cwe-id: CWE-200
cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: apache
product: apisix
fofa-query:
- title="Apache APISIX Dashboard"
- title="apache apisix dashboard"
shodan-query: http.title:"apache apisix dashboard"
google-query: intitle:"apache apisix dashboard"
tags: apache,apisix,panel,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/user/login?redirect=%2F"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Apache APISIX Dashboard</title>'
- type: status
status:
- 200
extractors:
- type: regex
part: header
group: 1
regex:
- '(?i)Server:\s+APISIX\/([0-9.]+)'
# digest: 4a0a00473045022100a940cd30cf964f8a3ef5159ab5e0dfbc0ba5a40dfc2010b5d2ced342e756118702202a1abdb65f1f2c2a08522ce8b8a94c2c04f612cf7ea0bfe8baa0ed863e3eef55:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/apache/apache-apisix-panel.yaml"

View on Github