Skip to content

Cockpit Project Login Panel - Detect

ID: cockpit-project-panel

Severity: info

Author: righettod

Tags: panel,cockpit,login

Cockpit Project products was detected.

id: cockpit-project-panel
info:
name: Cockpit Project Login Panel - Detect
author: righettod
severity: info
description: |
Cockpit Project products was detected.
reference:
- https://github.com/cockpit-project/cockpit
- https://cockpit-project.org/
metadata:
max-request: 1
verified: true
shodan-query: http.html:"cockpit/static/login.css"
tags: panel,cockpit,login
http:
- method: GET
path:
- "{{BaseURL}}/"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_all(to_lower(body), "cockpit/", "is_cockpit_client")'
condition: and
extractors:
- type: regex
part: body
name: os
group: 1
regex:
- '(?i)"PRETTY_NAME"\s*:\s*"(.*?)"'
internal: true
- type: regex
part: body
name: hostname
group: 1
regex:
- '(?i)"hostname"\s*:\s*"(.*?)"'
internal: true
- type: dsl
dsl:
- '"OS: " + os + " | Hostname: " + hostname'
# digest: 4b0a00483046022100fec795ee873ea260405bc256a09f68e46b08e8c5546b8aff754a8812683c0da20221008f314f92d3cadff405ef1b1464883dc70a95f8d0e2da79a5fc53830fc419e6c6:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/cockpit-project-panel.yaml"

View on Github