Skip to content

BeyondTrust Privileged Access Management Login - Detect

ID: beyondtrust-login-server

Severity: info

Author: r3dg33k,nuk3s3c

Tags: beyondtrust,pam,panel

BeyondTrust Privileged Access Management login panel was detected.

id: beyondtrust-login-server
info:
name: BeyondTrust Privileged Access Management Login - Detect
author: r3dg33k,nuk3s3c
severity: info
description: BeyondTrust Privileged Access Management login panel was detected.
reference:
- https://www.beyondtrust.com/brand
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
max-request: 1
tags: beyondtrust,pam,panel
http:
- method: GET
path:
- '{{BaseURL}}/WebConsole/api/security/auth/loginServers'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- '"DomainName":"(.*)"'
- '"domains":'
condition: and
extractors:
- type: json
part: body
json:
- ".domains[] | .DomainName"
- ".domains[] | .ldapservers"
# digest: 4a0a00473045022100cca43b7010cb66d866bbcabddf4942950e4b91211cfe0ab5c210aed8b3fbdc7102201c7a3032eb5e59acbda42545ef1ef0dde3a8a113409396e9284bf6b00c4d4a91:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/beyondtrust-login-server.yaml"

View on Github