Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

CargoCollective Takeover Detection

By kannthu

Vidoc logoVidoc Module

What is the "CargoCollective Takeover Detection?"

The "CargoCollective Takeover Detection" module is designed to detect potential takeover vulnerabilities in websites built on the CargoCollective platform. CargoCollective is a popular website builder used by many individuals and businesses to create and host their websites. This module focuses on identifying misconfigurations or vulnerabilities that could potentially allow an attacker to take control of a CargoCollective website.

This module has a severity level of high, indicating that the identified vulnerabilities could have a significant impact on the security and functionality of the affected websites.

The original author of this module is pdteam.


If a takeover vulnerability is successfully exploited, an attacker could gain unauthorized access to the CargoCollective website and potentially manipulate its content, steal sensitive information, or disrupt its normal operation. This could lead to reputational damage, financial losses, and compromised user data.

How does the module work?

The "CargoCollective Takeover Detection" module works by sending HTTP requests to the target website and analyzing the responses based on predefined matching conditions. It uses a set of matchers to identify specific patterns or indicators that suggest the presence of a takeover vulnerability.

One of the matching conditions used by this module is the absence of a specific HTML element with the class "notfound" and the text "404 Not Found". If this element is found in the response, it indicates that the website is not vulnerable to takeover.

Additionally, the module checks if the host of the website is not an IP address, as this can be an indication of a misconfiguration or vulnerability.

By combining these matching conditions, the module can accurately detect potential takeover vulnerabilities in CargoCollective websites.

Here is an example of an HTTP request that the module might send:

GET / HTTP/1.1
User-Agent: Vidoc/1.0
Accept: */*

This request is sent to the root path ("/") of the target website, and the "Host" header is set to the domain of the website being scanned.

It's important to note that this module is just one test case among many that the Vidoc platform uses to perform comprehensive scanning and detection of vulnerabilities, misconfigurations, and software fingerprints.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: <div class="notfound">, 404 Not Found<br...
On match action
Report vulnerability