nuclei-templates/http/misconfiguration/kubernetes/kubernetes-pods.yaml

37 lines
1.0 KiB
YAML
Raw Permalink Normal View History

2020-06-17 17:11:32 +00:00
id: kubernetes-pods-api
2020-09-17 08:50:01 +00:00
2020-06-17 15:56:34 +00:00
info:
name: Kubernetes Pods - API Discovery & Remote Code Execution
2021-06-09 12:20:56 +00:00
author: ilovebinbash,geeknik,0xtavian
severity: critical
description: A Kubernetes Pods API was discovered. When the service port is available, unauthenticated users can execute commands inside the container.
reference:
- https://github.com/officialhocc/Kubernetes-Kubelet-RCE
- https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/
metadata:
max-request: 2
2023-10-14 11:27:55 +00:00
tags: k8,unauth,kubernetes,devops,misconfig
2020-09-17 08:50:01 +00:00
http:
2020-06-17 15:56:34 +00:00
- method: GET
path:
2020-09-17 08:50:01 +00:00
- '{{BaseURL}}/pods'
2020-12-21 19:35:12 +00:00
- '{{BaseURL}}/api/v1/pods'
2021-09-04 10:24:24 +00:00
matchers-condition: and
2020-06-17 15:56:34 +00:00
matchers:
- type: word
words:
- "apiVersion"
2021-09-04 10:24:24 +00:00
2020-06-17 15:56:34 +00:00
- type: word
words:
- "application/json"
part: header
2021-09-04 10:24:24 +00:00
- type: status
status:
- 200
# digest: 490a004630440220143f86f473fcb74736d85435c11b69e2645ba37764c811f4e110e562a564f86f02203653a4866258336dcab5cc24bd804ff82ececf124d7ca7f8d9b4685e6bf71b1b:922c64590222798bb761d5b6d8e72950