Skip to content

Graylog Login Panel - Detect

ID: graylog-panel

Severity: info

Author: righettod

Tags: panel,graylog,login,detect

Graylog login panel was detected.

id: graylog-panel
info:
name: Graylog Login Panel - Detect
author: righettod
severity: info
description: |
Graylog login panel was detected.
reference:
- https://graylog.org/
classification:
cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: graylog
product: graylog
shodan-query: http.title:"Graylog Web Interface"
tags: panel,graylog,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "<title>Graylog Web Interface")'
condition: and
# digest: 490a004630440220625a604216aae864965cbb18f49ba639dc8351f5133dff613636a736b639710402200f11de3c35db59e71f52ceab9c54a25b0d514fbd15aba4bae95b2d3643f1ef62:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/graylog-panel.yaml"

View on Github