nuclei-templates/http/misconfiguration/apache/apache-server-status.yaml

35 lines
1.2 KiB
YAML
Raw Normal View History

2024-01-05 08:19:03 +00:00
id: apache-server-status
info:
2024-01-10 12:23:57 +00:00
name: Apache Server Status Disclosure
2024-01-10 06:59:23 +00:00
author: thabisocn
severity: low
description: |
Apache /server-status displays information about your Apache status. If you are not using this feature, disable it.
2024-01-10 06:59:23 +00:00
reference:
- https://www.exploit-db.com/ghdb/5548
- https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-status-detected/
- https://www.acunetix.com/vulnerabilities/web/apache-server-status-detected/
2024-01-05 08:19:03 +00:00
metadata:
verified: true
max-request: 2
2024-01-10 06:59:23 +00:00
google-Dork:
2024-01-06 19:04:03 +00:00
- site:*/server-status intext:"Apache server status for"
- site:*/server-info intext:"Apache server Information"
2024-01-10 12:23:57 +00:00
tags: misconfig,exposure,apache,debug
2024-01-05 08:19:03 +00:00
http:
- method: GET
path:
2024-01-06 19:04:03 +00:00
- "{{BaseURL}}/server-info"
2024-01-10 06:59:23 +00:00
- "{{BaseURL}}/server-status"
2024-01-06 19:04:03 +00:00
2024-01-05 08:19:03 +00:00
stop-at-first-match: true
matchers:
2024-01-10 12:23:57 +00:00
- type: dsl
dsl:
- 'contains_any(body, "Apache Server Status", "Apache Server Information")'
- 'contains(body, "Server Version")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100b650e330a4deb7b6a481d84ebb16e607c04173093f3f35d9e6e7af033150a20d02200a8bc7b816cc6a715dbd6ac472833b16a9037b50ab99886af66fd4cfbc18a25f:922c64590222798bb761d5b6d8e72950