Skip to content

HYPERPLANNING Login Panel - Detect

ID: hyperplanning-panel

Severity: info

Author: righettod

Tags: panel,hyperplanning,login,detect

HYPERPLANNING products was detected.

id: hyperplanning-panel
info:
name: HYPERPLANNING Login Panel - Detect
author: righettod
severity: info
description: |
HYPERPLANNING products was detected.
reference:
- https://www.index-education.com/fr/presentation-hyperplanning.php
metadata:
max-request: 1
shodan-query: http.title:"HYPERPLANNING"
tags: panel,hyperplanning,login,detect
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "hyperplanning</title>", "content=\"hyperplanning\"")'
condition: and
extractors:
- type: regex
part: header
group: 1
regex:
- '(?i)Server:\s+HYPERPLANNING\s+([0-9.\s\-]+)'
# digest: 4b0a004830460221008cb5dbf083edf9648333303cbcddf2f4767ce8abd80a8220ea295ad4c2c0f39502210091671f606e433f8a9be675126366e29011983198da220e516f059c5419b14d0f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/hyperplanning-panel.yaml"

View on Github