2022-08-25 06:22:48 +00:00
id : django-variables-exposed
2022-08-12 04:47:07 +00:00
info :
2023-02-05 17:42:16 +00:00
name : Django Config - Detect
2022-08-12 04:47:07 +00:00
author : nobody
2022-08-25 06:22:48 +00:00
severity : info
2023-02-05 21:45:20 +00:00
description : Django configuration information was detected, which could reveal web application framework exceptions that could indicate exploitation attempts.
2022-08-12 04:47:07 +00:00
reference :
2022-08-20 08:29:01 +00:00
- https://docs.djangoproject.com/en/1.11/ref/exceptions/
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
2023-02-05 17:42:16 +00:00
- https://github.com/projectdiscovery/nuclei-templates/blob/master/file/logs/django-framework-
classification :
2023-03-03 15:27:54 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score : 0.0
cwe-id : CWE-200
2022-08-21 11:55:03 +00:00
metadata :
verified : true
2022-08-25 06:22:48 +00:00
tags : exposure,config,django
2022-08-12 04:47:07 +00:00
requests :
- method : GET
path :
- "{{BaseURL}}"
matchers-condition : and
matchers :
- type : word
words :
- 'seeing this error because you have <code>DEBUG = True</code>'
- 'SuspiciousOperation'
- 'DisallowedHost'
- 'DisallowedModelAdminLookup'
- 'DisallowedModelAdminToField'
- 'DisallowedRedirect'
- 'InvalidSessionKey'
- 'RequestDataTooBig'
- 'SuspiciousFileOperation'
- 'SuspiciousMultipartForm'
- 'SuspiciousSession'
- 'TooManyFieldsSent'
- 'PermissionDenied'
2022-08-21 11:57:55 +00:00
condition : or
2022-08-12 04:47:07 +00:00
- type : word
part : header
words :
- "text/html"
2022-08-21 11:55:03 +00:00
- type : status
status :
- 400
2023-02-05 17:42:16 +00:00
# Enhanced by mp on 2023/02/05