Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

OpenCart Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#opencart
Description

OpenCart Login Panel - Detect

What is the "OpenCart Login Panel - Detect?"

The "OpenCart Login Panel - Detect" module is designed to detect the presence of the OpenCart login panel. OpenCart is an open-source e-commerce platform used for building online stores. This module focuses on identifying the login panel specifically.

The severity of this module is classified as informative, meaning it provides valuable information but does not indicate a vulnerability or misconfiguration.

This module was authored by ricardomaia.

Impact

This module does not have a direct impact on the system. It simply detects the presence of the OpenCart login panel, providing information about its existence.

How does the module work?

The module works by sending HTTP requests to specific paths associated with the OpenCart login panel. For example, it may send a GET request to "/admin/index.php?route=account/login".

The module then applies matching conditions to the response received from the server. In this case, it uses regular expressions to search for specific patterns indicating the presence of the OpenCart login panel. The patterns include references to OpenCart in the footer, logo, and powered by section.

Here is an example of a regular expression used for matching:

(?i)footer\s.*OpenCart.*All.Rights.Reserved|img\s.*logo.*\salt=.*OpenCart

If any of the matching conditions are met, the module reports the detection of the OpenCart login panel.

For more information about OpenCart, you can visit the official website: https://www.opencart.com

Metadata:

- max-request: 2 - verified: true - shodan-query: html:"OpenCart"

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/admin/index.php?route=acc...
Matching conditions
regex: (?i)footer\s.*OpenCart.*All.Rights.Reser...
Passive global matcher
No matching conditions.
On match action
Report vulnerability