Skip to content

Symantec Data Loss Prevention Login Panel - Detect

ID: symantec-dlp-login

Severity: info

Author: princechaddha

Tags: symantec,panel,login

Symantec Data Loss Prevention login panel was detected.

id: symantec-dlp-login
info:
name: Symantec Data Loss Prevention Login Panel - Detect
author: princechaddha
severity: info
description: Symantec Data Loss Prevention login panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:symantec:data_loss_prevention:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: symantec
product: data_loss_prevention
shodan-query:
- http.title:"Symantec Data Loss Prevention"
- http.title:"symantec data loss prevention"
fofa-query: title="symantec data loss prevention"
google-query: intitle:"symantec data loss prevention"
tags: symantec,panel,login
http:
- method: GET
path:
- '{{BaseURL}}/ProtectManager/Logon'
matchers-condition: and
matchers:
- type: word
words:
- "<title>Symantec Data Loss Prevention</title>"
part: body
- type: status
status:
- 200
# digest: 4a0a00473045022003a406cfc15050f22d325670487233f22a8aa7bda3cd318fadabc9d9aba0df2f0221009e49058a8b830da32252ab679b3f924d6b32d6cd41c53ee043db0f168eef7fd9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/symantec/symantec-dlp-login.yaml"

View on Github