nuclei-templates/http/exposures/configs/parameters-config.yaml

39 lines
1003 B
YAML
Raw Permalink Normal View History

2022-07-04 18:34:35 +00:00
id: parameters-config
info:
name: Parameters.yml - File Discovery
2022-07-04 18:34:35 +00:00
author: DhiyaneshDK
2022-07-05 04:11:15 +00:00
severity: high
description: Parameters.yml was discovered.
2022-07-04 18:59:52 +00:00
reference: https://www.exploit-db.com/ghdb/5986
2022-07-04 18:34:35 +00:00
metadata:
2022-07-05 04:24:11 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 4
2022-07-04 18:34:35 +00:00
shodan-query: html:"parameters.yml"
2022-07-05 04:11:15 +00:00
tags: exposure,cloud,devops
2022-07-04 18:34:35 +00:00
http:
2022-07-04 18:34:35 +00:00
- method: GET
path:
- "{{BaseURL}}/parameters.yml"
- "{{BaseURL}}/app/config/parameters.yml"
2022-07-04 18:59:52 +00:00
- "{{BaseURL}}/parameters.yml.dist"
- "{{BaseURL}}/app/config/parameters.yml.dist"
2022-07-04 18:34:35 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2022-07-04 18:34:35 +00:00
matchers-condition: and
matchers:
- type: word
words:
2022-07-05 04:11:15 +00:00
- 'parameters:'
2022-07-04 18:34:35 +00:00
- 'database_user'
- 'database_password'
2022-07-05 04:11:15 +00:00
condition: and
2022-07-04 18:34:35 +00:00
- type: status
status:
- 200
# digest: 4a0a0047304502200e495a7fb56699ba0f199c6e3eceea337ad4658d1c8ba998456a5933d95b8c28022100aa326b3af502e03aab53d47fd9cea4148ae2d6bed5944d7196a71dfa34e30ff7:922c64590222798bb761d5b6d8e72950