Skip to content

Supermicro BMC Login Panel - Detect

ID: supermicro-bmc-panel

Severity: info

Author: idealphase

Tags: panel,supermicro,bmc

Supermicro BMC login panel was detected.

id: supermicro-bmc-panel
info:
name: Supermicro BMC Login Panel - Detect
author: idealphase
severity: info
description: Supermicro BMC login panel was detected.
reference:
- https://www.supermicro.com/en
- https://www.supermicro.com/en/solutions/management-software/bmc-resources
- https://www.supermicro.com/white_paper/IPMI_white_paper.pdf
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:h:supermicro:x11ssv-m4f:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"Supermicro BMC Login"
google-query: intitle:"Supermicro BMC Login"
product: x11ssv-m4f
vendor: supermicro
tags: panel,supermicro,bmc
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Supermicro BMC Login</title>"
- type: status
status:
- 200
# digest: 4a0a00473045022100f13c0b88eebda472c7105314005169c145f7c93b995a5f8ee52c02c9d5140c4b02203655702dd9051aafa5155500924ec95652edb5d5bd153ea81f6aeb8c5767736b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/supermicro-bmc-panel.yaml"

View on Github