nuclei-templates/http/exposures/files/cloud-config.yaml

35 lines
931 B
YAML
Raw Permalink Normal View History

2022-07-04 17:06:36 +00:00
id: cloud-config
info:
2022-12-20 04:26:55 +00:00
name: Cloud Config File Exposure
author: DhiyaneshDK,Hardik-Solanki
severity: medium
2024-01-02 16:16:15 +00:00
description: Cloud Config file is exposed.
2022-07-04 17:06:36 +00:00
reference: https://www.exploit-db.com/ghdb/7959
metadata:
2022-07-05 04:24:17 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 3
2022-07-04 17:06:36 +00:00
shodan-query: html:"cloud-config.yml"
2022-10-13 10:12:07 +00:00
tags: exposure,cloud,devops,files
2022-07-04 17:06:36 +00:00
http:
2022-07-04 17:06:36 +00:00
- method: GET
path:
- "{{BaseURL}}/cloud-config.yml"
2022-07-04 17:06:36 +00:00
- "{{BaseURL}}/core-cloud-config.yml"
2022-12-20 04:26:55 +00:00
- '{{BaseURL}}/cloud-config.txt'
2022-07-04 17:06:36 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2022-07-04 17:06:36 +00:00
matchers-condition: and
matchers:
- type: word
words:
- 'ssh_authorized_keys'
- '#cloud-config'
condition: and
2022-07-04 17:06:36 +00:00
- type: status
status:
- 200
# digest: 490a00463044022070154bbe8276ff9cf345a9568bbbc9e49cd546250ec749ff5a20b974e3c6418102204cdd06c2ebc4ce89c21bc5cb74169e53e0b747981e9e9492228ab3dfa4d7733a:922c64590222798bb761d5b6d8e72950