Skip to content

XPhone Connect Admin Interface - Detect

ID: xphoneconnect-admin-panel

Severity: info

Author: FLX

Tags: panel,xphone,login,detect

Detects the presence of the XPhone Connect admin interface.

id: xphoneconnect-admin-panel
info:
name: XPhone Connect Admin Interface - Detect
author: FLX
severity: info
description: |
Detects the presence of the XPhone Connect admin interface.
reference:
- https://www.c4b.com/en/xphone-connect/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: c4b
product: xphone
fofa-query: icon_hash="516202656"
tags: panel,xphone,login,detect
http:
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/xphoneconnect/admin/Login.aspx'
host-redirects: true
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "XPhone Connect server - Logon"
- "XPhone Web-Meeting"
condition: or
- type: status
status:
- 200
# digest: 4b0a004830460221008e046bc2cf6821d5f058232e4f7ba6dea48e07d18a49c659040f2c4df807d5cb022100fa26e531eda3bbadf0db421ee2d67c27543efefc229b78b1bbfc7df25f0de472:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/xphoneconnect-admin-panel.yaml"

View on Github