nuclei-templates/http/exposed-panels/kiali-panel.yaml

43 lines
1.1 KiB
YAML
Raw Permalink Normal View History

2024-08-19 13:50:45 +00:00
id: kiali-panel
info:
name: Kiali - Detect
author: righettod
severity: info
2024-08-19 16:26:41 +00:00
description: |
kiali panel was detected.
2024-08-19 13:50:45 +00:00
reference:
- https://kiali.io/
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
2024-08-19 13:50:45 +00:00
metadata:
verified: true
2024-08-19 16:26:41 +00:00
max-request: 2
2024-09-10 08:22:50 +00:00
vendor: kiali
2024-09-10 09:08:16 +00:00
product: kiali
shodan-query: title:"Kiali"
2024-08-19 13:50:45 +00:00
tags: panel,kiali,detect,login
http:
- method: GET
path:
- "{{BaseURL}}/kiali/api/status"
- "{{BaseURL}}/kiali/"
2024-08-19 16:26:41 +00:00
host-redirects: true
max-redirects: 2
2024-08-19 13:50:45 +00:00
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
2024-08-19 16:26:41 +00:00
- 'contains_any(to_lower(body), "kiali-ui", "<title>kiali", "kiali version")'
2024-08-19 13:50:45 +00:00
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
2024-08-19 16:26:41 +00:00
- '(?i)"Kiali version":\s*"([a-z0-9.]+)"'
2024-09-12 05:14:01 +00:00
# digest: 4b0a00483046022100feabc099327aefc127052132e8d4cc0c447571966798b5bdc199cfa8cda7470a022100ebb403105656fe74211e458eb7e897ccaf871cf68eba5e634bf82e964ccf6d75:922c64590222798bb761d5b6d8e72950