Skip to content

Microsoft SharePoint Detect

ID: microsoft-sharepoint-detect

Severity: info

Author: p-l-

Tags: sharepoint,iis,microsoft,tech

Check for SharePoint, using HTTP header MicrosoftSharePointTeamServices

id: microsoft-sharepoint-detect
info:
name: Microsoft SharePoint Detect
author: p-l-
severity: info
description: Check for SharePoint, using HTTP header MicrosoftSharePointTeamServices
metadata:
max-request: 1
tags: sharepoint,iis,microsoft,tech
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header
regex:
- "(?i)(Microsoftsharepointteamservices:)"
extractors:
- type: kval
kval:
- MicrosoftSharePointTeamServices
# digest: 4a0a004730450220285ceb26e86c91f25df61d90e7611ff1f981d59a721920b289867fea7f26a1f40221008913115af852305922b88fa517d55386a6ba06c19cf06520de8dddf5464fa1f9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/technologies/microsoft/microsoft-sharepoint-detect.yaml"

View on Github