Skip to content

Atlassian Bamboo Login Panel - Detect

ID: atlassian-bamboo-panel

Severity: info

Author: righettod

Tags: panel,bamboo,login,detect

Atlassian Bamboo login panel was detected.

id: atlassian-bamboo-panel
info:
name: Atlassian Bamboo Login Panel - Detect
author: righettod
severity: info
description: |
Atlassian Bamboo login panel was detected.
reference:
- https://www.atlassian.com/software/bamboo
classification:
cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
product: bamboo
shodan-query: http.title:"Bamboo"
tags: panel,bamboo,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/userlogin!doDefault.action?os_destination=%2Fstart.action"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>Log in as a Bamboo user'
- 'content="Bamboo'
- 'atlassian.bamboo.plugins'
- 'Atlassian Bamboo</a>'
condition: or
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- 'version\s+([0-9A-Za-z\s\.]+)\s+-'
- 'pvpVersion = "([a-z0-9.]+)";'
# digest: 4b0a00483046022100eefe9c240fbbe4a3cc02e6ea1fe6a9ac352c4e9b3bc5ac848305dbf2120f8f2d022100bc6ba8c1196e1c926b35e778445a4fd7f7d337573e4ae9449fb8eb8e44e71e41:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/atlassian-bamboo-panel.yaml"

View on Github