nuclei-templates/http/technologies/hashicorp-vault-detect.yaml

22 lines
582 B
YAML
Raw Normal View History

2021-11-12 16:59:49 +00:00
id: hashicorp-vault-detect
info:
name: HashiCorp Vault Detect
author: Adam Crosser
severity: info
description: Detects HashiCorp Vault
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: tech,hashicorp
2021-11-12 16:59:49 +00:00
http:
2021-11-12 16:59:49 +00:00
- method: GET
path:
- "{{BaseURL}}/ui/vault/auth"
matchers:
- type: word
2021-11-12 20:09:02 +00:00
part: body
2021-11-12 16:59:49 +00:00
words:
2023-10-14 11:27:55 +00:00
- '<meta name="vault/config/environment"'
# digest: 4b0a00483046022100877fc6d2edb0748eabce5482f9352c81e05cea8a516ccdd02c784e53eb1677870221009ca3d3ed3ca0c37ca9fc0c321fe32a3bfca6350f03886f754f2ecb4427515d67:922c64590222798bb761d5b6d8e72950