Skip to content

WSO2 Management Console Login Panel - Detect

ID: wso2-management-console

Severity: info

Author: dhiyaneshDK,johnk3r

Tags: panel,wso2,edb

WSO2 Management Console login panel was detected.

id: wso2-management-console
info:
name: WSO2 Management Console Login Panel - Detect
author: dhiyaneshDK,johnk3r
severity: info
description: WSO2 Management Console login panel was detected.
reference:
- https://www.exploit-db.com/ghdb/5691
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: wso2
product: api_manager
shodan-query: http.favicon.hash:1398055326
fofa-query: icon_hash=1398055326
google-query: inurl:"carbon/admin/login"
tags: panel,wso2,edb
http:
- method: GET
path:
- '{{BaseURL}}/carbon/admin/login.jsp'
matchers-condition: and
matchers:
- type: word
part: response
words:
- "<title>WSO2 Management Console</title>"
- "WSO2 Carbon Server"
condition: or
- type: status
status:
- 200
extractors:
- type: kval
part: header
kval:
- server
# digest: 4b0a00483046022100fbdbfeb6efc584ccba376bdb5253079c240481bd8385cb01ac7184a0804aedde022100accd820bf41a3784a1e5551a3a86ef995a1aaaad954be1321ff5003b8604341c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/wso2-management-console.yaml"

View on Github