Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Cortex XSOAR Login Panel - Detect

By kannthu

Vidoc logoVidoc Module

What is the "Cortex XSOAR Login Panel - Detect?"

The "Cortex XSOAR Login Panel - Detect" module is designed to detect the presence of the Cortex XSOAR login panel. Cortex XSOAR is a software platform that enables security orchestration, automation, and response (SOAR) capabilities. This module focuses on identifying potential misconfigurations or vulnerabilities related to the login panel.

This module has an informative severity level, which means it provides valuable insights and information but does not indicate a critical security issue.

This module was authored by dhiyaneshDK.


The impact of detecting the Cortex XSOAR login panel is primarily related to identifying potential security risks or misconfigurations. By detecting the login panel, security professionals can assess the security posture of the Cortex XSOAR platform and take appropriate actions to mitigate any identified vulnerabilities or weaknesses.

How does the module work?

The module works by sending an HTTP GET request to the "/#/login" path of the target website. It then applies two matching conditions to determine if the Cortex XSOAR login panel is present:

- The module checks if the response body contains the HTML title tag "<title>Cortex XSOAR</title>". - The module verifies that the HTTP response status code is 200, indicating a successful request.

If both matching conditions are met, the module reports the detection of the Cortex XSOAR login panel.

It's important to note that this module is just one test case within the Vidoc platform, which utilizes multiple modules to perform comprehensive scanning and detection of various misconfigurations, vulnerabilities, and software fingerprints.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: <title>Cortex XSOAR</title>and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability