Skip to content

Bitwarden Web Vault Login Panel - Detect

ID: bitwarden-vault-panel

Severity: info

Author: ritikchaddha

Tags: panel,bitwarden,vault,detect

id: bitwarden-vault-panel
info:
name: Bitwarden Web Vault Login Panel - Detect
author: ritikchaddha
severity: info
reference:
- https://bitwarden.com/?utm_source=google&utm_medium=cpc&utm_campaign=AW_ALL_NU_CL_Bitwarden_en_GSN_DTMB_Brand-Login_KW:Brand-Login_Consolidated&utm_content=646427936792&utm_term=bitwarden%20vault%20login|kwd-826827349840&hsa_acc=2567950947&hsa_cam=19621984700&hsa_grp=145977914135&hsa_ad=646427936792&hsa_src=g&hsa_tgt=kwd-826827349840&hsa_kw=bitwarden%20vault%20login&hsa_mt=e&hsa_net=adwords&hsa_ver=3&gad=1&gclid=Cj0KCQjwpompBhDZARIsAFD_Fp-07Mni-xzuKd5Ewi6I7qzRTdZOYSxMsMVvKVWhGm5qg2KUiY2Z7SQaAvSIEALw_wcB
classification:
cpe: cpe:2.3:a:bitwarden:bitwarden:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: bitwarden
product: bitwarden
shodan-query:
- title:"Bitwarden Web Vault"
- http.title:"bitwarden web vault"
fofa-query: title="bitwarden web vault"
google-query: intitle:"bitwarden web vault"
tags: panel,bitwarden,vault,detect
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Bitwarden Web Vault</title>'
- 'alt="Bitwarden'
condition: or
- type: status
status:
- 200
# digest: 4b0a004830460221009149157a11d9fc1314ecc5125693cae384a247b2ff44714b3e15cf3d1a5816d1022100fa86ae1010579536ddb7958e301ca8dc234824de9b9374119a4b2edebcbebaa7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/bitwarden-vault-panel.yaml"

View on Github