Skip to content

CGI Test page

ID: cgi-test-page

Severity: info

Author: YASH ANAND @yashanand155

Tags: cgi,misconfig

id: cgi-test-page
info:
name: CGI Test page
author: YASH ANAND @yashanand155
severity: info
metadata:
max-request: 1
tags: cgi,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/test/test.cgi"
matchers-condition: and
matchers:
- type: word
words:
- HTTP_ACCEPT
- HTTP_ACCEPT_ENCODING
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502206909bcef5949de1bd21924de30411abc143d0776466ab2e48c96a20c277c1f44022100f3660dfc4b363b300e82c561ac230606927026b6cf1b3927c154a4d43408253f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/cgi-test-page.yaml"

View on Github