Skip to content

GLPI Panel - Detect

ID: glpi-project_glpi

Severity: info

Author: dogasantos,daffainfo,ricardomaia,dhiyaneshDk

Tags: glpi,edb,panel,glpi-project

GLPI panel was detected.

id: glpi-project_glpi
info:
name: GLPI Panel - Detect
author: dogasantos,daffainfo,ricardomaia,dhiyaneshDk
severity: info
description: GLPI panel was detected.
reference:
- https://glpi-project.org/
- https://www.exploit-db.com/ghdb/7002
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
vendor: glpi-project
product: glpi
shodan-query:
- http.title:"GLPI"
- http.title:"glpi"
- http.favicon.hash:"-1474875778"
fofa-query:
- title="glpi"
- icon_hash="-1474875778"
google-query: intitle:"glpi"
tags: glpi,edb,panel,glpi-project
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/CHANGELOG.md"
- "{{BaseURL}}/glpi/"
redirects: true
max-redirects: 2
stop-at-first-match: false
matchers:
- type: word
case-insensitive: true
words:
- "GLPI"
- "glpi-project.org"
condition: and
extractors:
- type: regex
name: version
part: body
group: 1
regex:
- '(?i)base\.min\.js\?v=([\d.|\d]+)">'
- '(?i)jquery\.min\.js\?v=([\d.|\d]+)">'
- '(?i)# GLPI changes\n\n.*\n.*\n.*\n##\s\[(\d+\.\d+|\d+\.\d+\.\d+)\]'
- '(?i)GLPI.*?([\d.|\d]+).copyright'
# digest: 4b0a00483046022100fa16a737aea1b9b6afcdb1380a01d97fa2799f238d26f03f858a14fc1bc75d55022100a69b723f997396a6c14c916fdf4ae7d98175bb0cd02a61725d6e7cfbf10dba5a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/glpi-panel.yaml"

View on Github