Skip to content

ArcGIS Enterprise Panel

ID: arcgis-panel

Severity: info

Author: Podalirius

Tags: docs,arcgis,cms,panel,esri

An ArcGIS instance was discovered.

id: arcgis-panel
info:
name: ArcGIS Enterprise Panel
author: Podalirius
severity: info
description: An ArcGIS instance was discovered.
reference:
- https://enterprise.arcgis.com/en/
classification:
cwe-id: CWE-200
cpe: cpe:2.3:a:esri:arcgis_enterprise:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: esri
product: arcgis_enterprise
tags: docs,arcgis,cms,panel,esri
http:
- method: GET
path:
- '{{BaseURL}}/portal/portalhelp/en/'
matchers-condition: and
matchers:
- type: word
words:
- 'ArcGIS Enterprise'
- 'Installation and Deployment'
condition: or
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '&nbsp;([0-9.]+)</span>'
- type: regex
part: body
group: 2
regex:
- '(Released Version:</strong>[\n\t ]+(([0-9]+(.[0-9]+)?(.[0-9]+)?)([\n\t
]+\([A-Za-z]+[\t ]+20[0-9][0-9]\))?))'
# digest: 4a0a00473045022002a5af11c111cea079167c503ef5d1eb945b9a498ab6ea670de40ac80dc926ca022100e042a50c6ae925de7c3d519a01f6285b2d99dfcaa20f27f955fa39c29f3ae6d8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/arcgis/arcgis-panel.yaml"

View on Github