Skip to content

LabKey Server Login Panel - Detect

ID: labkey-server-login

Severity: info

Author: tess

Tags: panel,labkey

LabKey Server login panel was detected.

id: labkey-server-login
info:
name: LabKey Server Login Panel - Detect
author: tess
severity: info
description: LabKey Server login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:labkey:labkey_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: labkey
product: labkey_server
shodan-query:
- 'title:"Sign In: /home"'
- 'http.title:"sign in: /home"'
- "server: labkey"
fofa-query: 'title="sign in: /home"'
google-query: 'intitle:"sign in: /home"'
tags: panel,labkey
http:
- method: GET
path:
- '{{BaseURL}}/labkey/home/login-login.view'
- '{{BaseURL}}/login/home/login.view'
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "TCTU LabKey Server: /home"
- "Powered by LabKey"
condition: or
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a004730450220414573166ed14d642bae41f6b3d0625c4b2a0c1e9ab605a9b31f8a2379909b55022100aff6f24138e177a5ea61c8bf1bdf8ea85dea23119d0da2cfb54df02675ae36b7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/labkey-server-login.yaml"

View on Github