nuclei-templates/http/exposures/configs/apache-pinot-config.yaml

42 lines
889 B
YAML
Raw Normal View History

id: apache-pinot-config
info:
name: Apache Pinot - Exposure
author: icarot
severity: medium
description: |
Detects if path Appconfigs of Apache Pinot web application is exposed, getting internal information about the configuration made.
classification:
cpe: cpe:2.3:a:apache:pinot:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2024-07-04 07:47:56 +00:00
verified: true
vendor: apache
product: pinot
2024-07-04 07:47:56 +00:00
shodan-query: title:"Apache Pinot"
tags: config,exposure,pinot,apache
http:
- method: GET
path:
- "{{BaseURL}}/appconfigs"
matchers-condition: and
matchers:
- type: word
2024-07-04 07:47:56 +00:00
part: body
words:
2024-07-04 07:47:56 +00:00
- '"systemConfig"'
- '"pinotConfig"'
- '"jvmConfig"'
condition: and
2024-07-04 07:47:56 +00:00
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200