nuclei-templates/exposures/configs/parameters-config.yaml

37 lines
824 B
YAML
Raw Normal View History

2022-07-04 18:34:35 +00:00
id: parameters-config
info:
name: Parameters.yml - File Discovery
2022-07-04 18:34:35 +00:00
author: DhiyaneshDK
2022-07-05 04:11:15 +00:00
severity: high
description: Parameters.yml was discovered.
2022-07-04 18:59:52 +00:00
reference: https://www.exploit-db.com/ghdb/5986
2022-07-04 18:34:35 +00:00
metadata:
2022-07-05 04:24:11 +00:00
verified: true
2022-07-04 18:34:35 +00:00
shodan-query: html:"parameters.yml"
2022-07-05 04:11:15 +00:00
tags: exposure,cloud,devops
2022-07-04 18:34:35 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/parameters.yml"
- "{{BaseURL}}/app/config/parameters.yml"
2022-07-04 18:59:52 +00:00
- "{{BaseURL}}/parameters.yml.dist"
- "{{BaseURL}}/app/config/parameters.yml.dist"
2022-07-04 18:34:35 +00:00
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
2022-07-05 04:11:15 +00:00
- 'parameters:'
2022-07-04 18:34:35 +00:00
- 'database_user'
- 'database_password'
2022-07-05 04:11:15 +00:00
condition: and
2022-07-04 18:34:35 +00:00
- type: status
status:
- 200
# Enhanced by mp on 2022/07/15