Skip to content

BeyondTrust Privileged Remote Access - Panel

ID: beyondtrust-priv-panel

Severity: info

Author: righettod

Tags: panel,beyondtrust,login,detect

BeyondTrust Privileged Remote Access login panel was detected.

id: beyondtrust-priv-panel
info:
name: BeyondTrust Privileged Remote Access - Panel
author: righettod
severity: info
description: |
BeyondTrust Privileged Remote Access login panel was detected.
reference:
- https://www.beyondtrust.com/products/privileged-remote-access
classification:
cpe: cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: beyondtrust
product: privileged_remote_access
shodan-query: "http.html:\"BeyondTrust Privileged Remote Access Login\""
tags: panel,beyondtrust,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/login/login"
- "{{BaseURL}}/login/pre_login_agreement"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "<title>beyondtrust privileged remote access login", "privileged-remote-access") && contains(to_lower(body), "login")'
condition: and
# digest: 4a0a00473045022005739645d85cdd9433433ba19e1b4332b6bccbccd88beeae6cbc9a823449588b0221008c766aba28676c91b7c93d4fe7c91cc0a35a0aff1976b0b22540a35dbbed2ae7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/beyondtrust-priv-panel.yaml"

View on Github