Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

ProjectSend Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#projectsend#edb
Description

What is the "ProjectSend Login Panel - Detect?"

The "ProjectSend Login Panel - Detect" module is designed to detect the presence of the ProjectSend login panel. ProjectSend is a web-based file sharing and management system that allows users to securely upload, store, and share files. This module focuses on identifying the login panel specifically.

The severity of this module is classified as informative, meaning it provides valuable information but does not indicate a vulnerability or misconfiguration.

This module was authored by idealphase.

Impact

This module does not have a direct impact on the security of the system. It simply detects the presence of the ProjectSend login panel, providing information about the system's configuration.

How does the module work?

The module works by sending HTTP requests to the target system and applying specific matching conditions to determine if the ProjectSend login panel is present.

Here is an example of an HTTP request that the module may send:

GET / HTTP/1.1
Host: example.com

The module uses the following matching conditions to identify the ProjectSend login panel:

- The response body must contain the text "Provided by ProjectSend" with a link to the ProjectSend website. - The response body must contain the HTML element with the attribute "id" set to "login_form". - The HTTP response status code must be 200 (OK).

If all of these conditions are met, the module will report that the ProjectSend login panel has been detected.

For more information, you can refer to the following references:

- https://www.exploit-db.com/ghdb/7380 - https://github.com/projectsend/projectsend

Metadata:

- Max request: 1 - Google query: [to be filled]

Module preview

Concurrent Requests (0)
Passive global matcher
regex: Provided by <a href="https?:\/\/www\.pro...and
word: id="login_form"and
status: 200
On match action
Report vulnerability