Skip to content

Seafile Panel - Detect

ID: seafile-panel

Severity: info

Author: TechbrunchFR,righettod

Tags: sefile,panel,login,seafile

Seafile panel was detected.

id: seafile-panel
info:
name: Seafile Panel - Detect
author: TechbrunchFR,righettod
severity: info
description: Seafile panel was detected.
reference:
- https://www.seafile.com/en/home/
- https://github.com/haiwen/seafile
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: seafile
product: seafile
shodan-query: http.favicon.hash:1552322396
fofa-query: icon_hash=1552322396
tags: sefile,panel,login,seafile
http:
- method: GET
path:
- "{{BaseURL}}/accounts/login/"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: dsl
dsl:
- "status_code==200"
- 'contains(body, "SEAFILE_GLOBAL") && contains(body, "seafile-ui.css")'
condition: and
# digest: 490a004630440220378acb10c3776f1cd577f115702b40196509a3ffe7045b11a148c66b6e1d17eb02206a13e0744295f9dc86dc7efdf81e42b67470329594513bff03bd2b7c9dc9bf5d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/seafile-panel.yaml"

View on Github