ZOHO ManageEngine ADSelfService Plus - Detect
ID: manageengine-adselfservice
Severity: info
Author: dhiyaneshDK,SaK1
Tags: panel,zoho,manageengine,zohocorp
Description
Section titled “Description”ZOHO ManageEngine ADSelfService panel was detected.
YAML Source
Section titled “YAML Source”id: manageengine-adselfservice
info: name: ZOHO ManageEngine ADSelfService Plus - Detect author: dhiyaneshDK,SaK1 severity: info description: ZOHO ManageEngine ADSelfService panel was detected. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cwe-id: CWE-200 cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: zohocorp product: manageengine_adselfservice_plus shodan-query: - http.title:"ADSelfService Plus" - http.title:"adselfservice plus" - http.title:"manageengine" fofa-query: - title="adselfservice plus" - title="manageengine" google-query: - intitle:"adselfservice plus" - intitle:"manageengine" tags: panel,zoho,manageengine,zohocorp
http: - method: GET path: - '{{BaseURL}}/authorization.do' - "{{BaseURL}}/servlet/GetProductVersion"
matchers-condition: and matchers: - type: word part: body words: - '<title>ADSelfService Plus</title>' - '"PRODUCT_NAME":"ManageEngine ADSelfService' condition: or
- type: status status: - 200
extractors: - type: regex part: body group: 1 regex: - '"BUILD_NUMBER":"([0-9]+)"'# digest: 490a0046304402203a4b2e4746cda34e71f6d5174bafe83ae10a764b80bed21cbb35a53e0d3c685b022062fc4e2ddc6c26f66d24f0752c3559f1d631ba4bf634fc86b16e068e4c0d2ae0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposed-panels/zoho/manageengine-adselfservice.yaml"