nuclei-templates/http/misconfiguration/hivequeue-agent.yaml

36 lines
881 B
YAML
Raw Permalink Normal View History

2022-09-05 12:07:07 +00:00
id: hivequeue-agent
info:
name: HiveQueue Agent
author: DhiyaneshDk
severity: low
2024-01-03 06:08:41 +00:00
description: HiveQueue Agent is exposed.
2022-09-05 12:07:07 +00:00
reference:
- https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5555061814557647/
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2022-09-05 12:07:07 +00:00
shodan-query: http.title:"HiveQueue"
tags: misconfig,hivequeue
http:
2022-09-05 12:07:07 +00:00
- method: GET
path:
- "{{BaseURL}}/monitoring"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>HiveQueue Agent</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100c83f5b80ea7847efd5569b8fc2f4fca944f9253c21348479a56634720ca73ee3022078b07b11d30eb932f0c8e955eeaf21478dd5ad8ef9f9255667df55aae574aaa8:922c64590222798bb761d5b6d8e72950