nuclei-templates/http/misconfiguration/aws/aws-object-listing.yaml

47 lines
1.1 KiB
YAML
Raw Normal View History

id: aws-object-listing
info:
name: AWS bucket with Object listing
author: pdteam
severity: low
2024-01-03 06:11:40 +00:00
description: Object listing is enabled in AWS bucket.
reference:
- https://mikey96.medium.com/cloud-based-storage-misconfigurations-critical-bounties-361647f78a29
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: aws,misconfig,bucket
http:
- method: GET
path:
- "{{BaseURL}}"
2021-06-06 07:49:01 +00:00
max-size: 1000
2023-10-14 11:27:55 +00:00
2021-04-07 12:15:49 +00:00
matchers-condition: and
matchers:
- type: word
2022-10-12 10:57:58 +00:00
part: body
words:
2021-06-06 07:49:01 +00:00
- '<ListBucketResult xmlns='
- type: word
2022-10-12 10:57:58 +00:00
part: header
words:
- application/xml
2021-06-06 07:49:01 +00:00
2024-06-18 07:32:11 +00:00
- type: word
part: header
words:
- "x-goog-metageneration"
- "x-goog-generation"
case-insensitive: true
negative: true
extractors:
- type: regex
part: body
group: 1
regex:
- '<Name>([a-z0-9-._]+)'
# digest: 4a0a00473045022100b4e7ee7ca74a63f236707271d9219e6a4c1e204e12e3e8bb2d3714a64fa9e5a8022068ee95e033478df3256a2323cf1d05917f9d857f58146001422a1b7861ce02a3:922c64590222798bb761d5b6d8e72950