nuclei-templates/http/misconfiguration/django-debug-detect.yaml

29 lines
867 B
YAML
Raw Normal View History

2020-09-13 17:25:10 +00:00
id: django-debug
info:
2024-01-30 10:47:24 +00:00
name: Django Debug Configuration Enabled
2021-06-09 12:20:56 +00:00
author: dhiyaneshDK,hackergautam
2020-09-14 10:03:10 +00:00
severity: medium
2024-01-30 10:47:24 +00:00
description: Django debug configuration is enabled, which allows an attacker to obtain system configuration information such as paths or settings.
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: django,debug,misconfig
2020-09-13 17:25:10 +00:00
http:
2020-09-13 17:25:10 +00:00
- method: GET
path:
2021-04-17 13:35:45 +00:00
- "{{BaseURL}}/NON_EXISTING_PATH/"
2020-09-13 17:25:10 +00:00
2020-09-14 10:03:10 +00:00
matchers-condition: and
2020-09-13 17:25:10 +00:00
matchers:
- type: word
words:
- URLconf defined
2020-09-14 10:03:10 +00:00
- Page not found
2021-04-17 13:35:45 +00:00
- Django tried these URL patterns, in this order
2020-09-13 17:25:10 +00:00
condition: and
2020-09-14 10:03:10 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 404
# digest: 4a0a0047304502204a5ac1486faa3be8702801b635c79e5a565724d1843641c69a5a09d012b23233022100a2ce507b92c7ffc804f071bc47c76185c97613307e1e15be73a224a45da5fa6a:922c64590222798bb761d5b6d8e72950