Skip to content

Nginx version detect

ID: nginx-version

Severity: info

Author: philippedelteil,daffainfo

Tags: tech,nginx

Some nginx servers have the version on the response header. Useful when you need to find specific CVEs on your targets.

id: nginx-version
info:
name: Nginx version detect
author: philippedelteil,daffainfo
severity: info
description: Some nginx servers have the version on the response header. Useful when you need to find specific CVEs on your targets.
metadata:
max-request: 1
tags: tech,nginx
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- 'nginx/[0-9.]+'
- type: status
status:
- 200
extractors:
- type: regex
part: header
regex:
- 'nginx/[0-9.]+'
# digest: 490a0046304402206c19d1f6fcb91fe8f03004e2c6c7aafcc83d5df122b151cd9f2332ab731fe11102204885672fe3dcab25ac2fcd1d80bb430bdc609466e655ad7fa45df3f6d7f75ede:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/technologies/nginx/nginx-version.yaml"

View on Github