nuclei-templates/http/misconfiguration/hivequeue-agent.yaml

38 lines
883 B
YAML
Raw Normal View History

2022-09-05 12:07:07 +00:00
id: hivequeue-agent
info:
name: HiveQueue Agent
author: DhiyaneshDk
severity: low
2024-01-03 06:08:41 +00:00
description: HiveQueue Agent is exposed.
2022-09-05 12:07:07 +00:00
reference:
- https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5555061814557647/
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2022-09-05 12:07:07 +00:00
shodan-query: http.title:"HiveQueue"
tags: misconfig,hivequeue
http:
2022-09-05 12:07:07 +00:00
- method: GET
path:
- "{{BaseURL}}/monitoring"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>HiveQueue Agent</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100ddd084ba9fd6271cf174fc13e5e0ddd7b5115089e392e80ea3a9aeec0ce06a3e02200c90d973698e797e794fe921362d85961ea7c66e14b6376b884a4b30c341d57b:922c64590222798bb761d5b6d8e72950