Skip to content

Liferay /api/axis - API Exposed

ID: liferay-axis

Severity: info

Author: DhiyaneshDk

Tags: misconfig,exposure,liferay,api

id: liferay-axis
info:
name: Liferay /api/axis - API Exposed
author: DhiyaneshDk
severity: info
reference: https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayAPI.java
classification:
cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: liferay
product: liferay_portal
shodan-query: title:"Liferay"
tags: misconfig,exposure,liferay,api
http:
- method: GET
path:
- "{{BaseURL}}/api/axis"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- ".*<h2>And now\\.\\.\\. Some Services<\\/h2>.*"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100bdfe46ed71da0264786cf6c3e072363d632c5ba0b5c1fa9bc3b62b1833628493022017db615e74ad3253e6c1b8f593f18d362163bbff02c7fdaab77304d2a76cac2f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/liferay/liferay-axis.yaml"

View on Github