Skip to content

Fuel CMS Login Panel - Detect

ID: fuelcms-panel

Severity: info

Author: Adam Crosser

Tags: panel,fuelcms,oss,daylightstudio

Fuel CMS login panel was detected.

id: fuelcms-panel
info:
name: Fuel CMS Login Panel - Detect
author: Adam Crosser
severity: info
description: Fuel CMS login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:daylightstudio:fuel_cms:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: daylightstudio
product: fuel_cms
shodan-query: http.title:"fuel cms"
fofa-query: title="fuel cms"
google-query: intitle:"fuel cms"
tags: panel,fuelcms,oss,daylightstudio
http:
- method: GET
path:
- "{{BaseURL}}/fuel/login"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>FUEL CMS</title>"
- type: status
status:
- 200
# digest: 4a0a0047304502202b7379bfc346ccd50e560c7cc046a36713fb6ea21e26fcc80773a82af795ad0c022100c6bbc3f3a0dfcd190dbaeb027e296f4d455d7b21b0979374118a96a11ef5579e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/fuelcms-panel.yaml"

View on Github