# frozen_string_literal: true ## # This file is part of WhatWeb and may be subject to # redistribution and commercial restrictions. Please see the WhatWeb # web site for more information on licensing and terms of use. # http://www.morningstarsecurity.com/research/whatweb ## WhatWeb::Plugin.define "Atlassian-JIRA" do @author = "Brendan Coles " # 2011-07-11 @version = "0.1" @description = "JIRA provides issue tracking and project tracking for software development teams to improve code quality and the speed of development." @website = "http://www.atlassian.com/software/jira/" # Google results as at 2011-07-11 # # 494 for "Bug tracking and project tracking for software development powered by Atlassian JIRA" "Warning: either you have javascript disabled or your browser does not support javascript" # ShodanHQ results as at 2011-07-11 # # 1,977 for x-arequestid # 759 for x-ausername # 76 for atlassian.xsrf.token # Dorks # @dorks = [ '"Bug tracking and project tracking for software development powered by Atlassian JIRA" "Warning: either you have javascript disabled or your browser does not support javascript"' ] # Matches # @matches = [ # noscript { text: "" }, # Powered by link { text: 'Bug tracking and project tracking for software development powered by Atlassian JIRA' }, # Version Detection # Footer { version: /\(([^\)^\s]+)\)<\/span>/ }, # Meta Decorator { text: '' }, ] # Passive # def passive(target) m = [] # x-arequestid m << { name: "x-arequestid header" } if target.headers["x-arequestid"] =~ /^[\d]+x[\d]+x[\d]+$/ # x-ausername m << { name: "x-ausername header" } if target.headers["x-ausername"] # atlassian.xsrf.token cookie m << { name: "atlassian.xsrf.token" } if target.headers["set-cookie"] =~ /atlassian\.xsrf\.token=/ # Return passive matches m end end