nuclei-templates/http/exposures/logs/production-logs.yaml

43 lines
1.0 KiB
YAML
Raw Normal View History

2021-07-24 19:28:33 +00:00
id: production-logs
info:
name: Discover production log files
author: geeknik
severity: info
2023-12-22 10:04:09 +00:00
description: Production log file was exposed.
metadata:
max-request: 3
2023-10-14 11:27:55 +00:00
tags: exposure,logs,rails
2021-07-24 19:28:33 +00:00
http:
2021-07-24 19:28:33 +00:00
- method: GET
path:
- "{{BaseURL}}/log/production.log"
- "{{BaseURL}}/logs/production.log"
- "{{BaseURL}}/production.log"
matchers-condition: and
matchers:
- type: word
words:
- "Connecting to database specified by database.yml"
- "Started GET"
condition: and
2021-07-25 20:22:26 +00:00
- type: status
status:
- 200
2021-07-24 19:28:33 +00:00
- type: word
part: header
words:
- "text/html"
negative: true
2021-07-25 20:22:26 +00:00
2021-07-24 19:28:33 +00:00
extractors:
- type: regex
name: last_modified
part: header
regex:
- 'Last-Modified:.*'
# digest: 4a0a004730450220069d9de39e4fbf696ec729078008a9f91411dc7d037e66c89ff96e23c973bc02022100d29de74e008f3ca4ef3e4b650f02b572d184e0a9de3380eab4a37cb6b35b25ab:922c64590222798bb761d5b6d8e72950