nuclei-templates/http/misconfiguration/apache-druid-unauth.yaml

33 lines
829 B
YAML
Raw Normal View History

2022-07-16 13:52:11 +00:00
id: apache-druid-unauth
info:
name: Apache Druid Unauth
author: DhiyaneshDk
severity: low
2024-01-03 06:08:41 +00:00
description: Apache Druid is exposed to external users.
2022-07-16 13:52:11 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2022-07-16 13:52:11 +00:00
shodan-query: title:"Apache Druid"
2024-09-10 08:22:50 +00:00
product: druid
vendor: apache
2022-07-17 04:02:44 +00:00
tags: misconfig,druid,unauth,apache
2022-07-16 13:52:11 +00:00
2024-09-10 08:22:50 +00:00
classification:
cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
http:
2022-07-16 13:52:11 +00:00
- method: GET
path:
- '{{BaseURL}}/unified-console.html'
matchers-condition: and
matchers:
- type: word
words:
- '<title>Apache Druid</title>'
- type: status
status:
- 200
2024-09-10 08:22:50 +00:00
# digest: 4a0a00473045022032410ebe88dff06244ecd5348b0e4a3340bcc6cbab1c26d061e3231e039f3e610221009adb943521d59e4485ab6d9a04e2117e3db0c6dae660a5ff0aa31213e9b83d97:922c64590222798bb761d5b6d8e72950