Skip to content

Apache RocketMQ Console Panel - Detect

ID: rocketmq-console-exposure

Severity: info

Author: pdteam

Tags: panel,apache

Apache RocketMQ Console panel was detected.

id: rocketmq-console-exposure
info:
name: Apache RocketMQ Console Panel - Detect
author: pdteam
severity: info
description: Apache RocketMQ Console panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: apache
product: rocketmq
shodan-query:
- http.title:"RocketMq-console-ng"
- http.title:"rocketmq-console-ng"
- http.title:"rocketmq"
fofa-query:
- title="rocketmq-console-ng"
- protocol="rocketmq"
- title="rocketmq"
google-query:
- intitle:"rocketmq"
- intitle:"rocketmq-console-ng"
tags: panel,apache
http:
- method: GET
path:
- '{{BaseURL}}'
matchers:
- type: word
words:
- "<title>RocketMq-console-ng</title>"
# digest: 4a0a00473045022027e11484657316dfaa05cf5dd968a5517e6c4ce68bc14e2f90a35c3d96c181dd022100b07e28be3eeff498aad836f7012d31addc7634f53158af3c8309889c33d77a3d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/rocketmq-console-exposure.yaml"

View on Github