Skip to content

Nagios XI Login Panel - Detect

ID: nagios-xi-panel

Severity: info

Author: ritikchaddha

Tags: panel,nagios,nagios-xi

Nagios XI login panel was detected.

id: nagios-xi-panel
info:
name: Nagios XI Login Panel - Detect
author: ritikchaddha
severity: info
description: Nagios XI login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: nagios
product: nagios_xi
shodan-query:
- http.title:"Nagios XI"
- http.title:"nagios xi"
fofa-query:
- title="nagios xi"
- app="nagios-xi"
google-query: intitle:"nagios xi"
tags: panel,nagios,nagios-xi
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/nagiosxi/login.php"
stop-at-first-match: true
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'alt="Nagios XI'
- '/nagiosxi/includes'
condition: or
- type: status
status:
- 200
# digest: 490a0046304402202b0da6e23949b8eca9bb2c8325203f163db08f8eac3fdc8adfa93dfa23b715c00220035737e19da68c2563633017598b3700efdcb791fda30da3a38012618665631b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/nagios-xi-panel.yaml"

View on Github