Skip to content

Axel WebServer - Panel Detect

ID: axel-webserver

Severity: info

Author: pikpikcu

Tags: panel,axel,webserver

Axel WebServer panel was detected.

id: axel-webserver
info:
name: Axel WebServer - Panel Detect
author: pikpikcu
severity: info
description: Axel WebServer panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: http.title:"Axel"
fofa-query: app="AxelWebServer"
tags: panel,axel,webserver
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "<title>(.*)Axel MyWeb(.*)</title>"
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- 'Axel MyWeb (.*)</title>'
# digest: 4a0a00473045022100ece066237170abe3fd4bf9c8c992faf1707d7a28f9a71e99bdc5a772949447b002205b9745f3b703929c6fcc9db414caef7f6a0c223a8c7b33cda700a603dba998ea:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/axel-webserver.yaml"

View on Github