Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Tiki Wiki CMS Groupware Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#tikiwiki
Description

Tiki Wiki CMS Groupware Login Panel - Detect

What is the "Tiki Wiki CMS Groupware Login Panel - Detect?"

The "Tiki Wiki CMS Groupware Login Panel - Detect" module is designed to detect the presence of the Tiki Wiki CMS Groupware login panel. Tiki Wiki CMS Groupware is a web-based content management system that offers a wide range of features for collaborative work. This module focuses specifically on identifying the login panel of the Tiki Wiki CMS Groupware.

This module has an informative severity level, which means it provides valuable information without indicating any immediate vulnerabilities or misconfigurations.

Impact

This module does not have any direct impact on the target system. It solely aims to identify the presence of the Tiki Wiki CMS Groupware login panel.

How the module works?

The "Tiki Wiki CMS Groupware Login Panel - Detect" module works by sending HTTP requests to specific paths, namely "/tiki-login_scr.php" and "/tiki-login.php", using the GET method. It then applies matching conditions to determine if the login panel is present.

The matching conditions include:

- Checking the HTTP response status code, which should be 200 (OK). - Verifying the presence of the phrase "Tiki Wiki CMS Groupware" in the response body.

If both conditions are met, the module considers the Tiki Wiki CMS Groupware login panel to be present.

Example HTTP request:

GET /tiki-login_scr.php HTTP/1.1
Host: example.com

Please note that this description provides an overview of the module's functionality and does not include the complete JSON definition. For more technical details, please refer to the module's JSON definition.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/tiki-login_scr.php/tiki-login.php
Matching conditions
status: 200and
word: Tiki Wiki CMS Groupware
Passive global matcher
No matching conditions.
On match action
Report vulnerability