Skip to content

Drupal Login Panel - Detect

ID: drupal-login

Severity: info

Author: pathtaga

Tags: panel,drupal

Drupal login panel was detected.

id: drupal-login
info:
name: Drupal Login Panel - Detect
author: pathtaga
severity: info
description: Drupal login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: drupal
product: drupal
shodan-query:
- http.component:"drupal"
- cpe:"cpe:2.3:a:drupal:drupal"
tags: panel,drupal
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/user/login"
stop-at-first-match: true
matchers-condition: or
matchers:
- type: regex
part: body
regex:
- '<(?:link|style)[^>]+"/sites/(?:default|all)/(?:themes|modules)/'
- '<[^>]+(?:id="block[_-]commerce[_-]cart[_-]cart|class="commerce[_-]product[_-]field)'
condition: or
- type: regex
part: header
regex:
- '(?i)x-drupal'
- "(?i)x-generator: drupal"
condition: or
# digest: 4a0a0047304502201ccc78febc8c374030ecf78f6a801c51426ad1f4f21f5e2f59e68812e46e117d022100fab307dc5c225eeb30ac63bde0cb807dcbcebb1acbbe480ccbeb78debe369801:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/drupal-login.yaml"

View on Github