nuclei-templates/http/exposed-panels/falcosidekick-panel.yaml

27 lines
809 B
YAML
Raw Normal View History

2024-07-14 07:41:09 +00:00
id: falcosidekick-panel
info:
name: Falcosidekick UI Login Panel - Detect
author: righettod
severity: info
description: Falcosidekick UI login panel was detected.
reference:
- https://github.com/falcosecurity/falcosidekick-ui
metadata:
max-request: 1
verified: true
shodan-query: http.title:"Falcosidekick"
tags: panel,falco,detect,login
http:
- method: GET
path:
- '{{BaseURL}}/login/'
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "falcosidekick ui", "falcosidekick-ui")'
condition: and
# digest: 4a0a00473045022100af97afecd9beaaa9c8b9b94b03bbfe590b0f81e728159ee1cdcdc4de34407b3302201dce0e4b75ceadf27a96601a8810c53b19e22f75c76a4ea23bd962cbc3c6e204:922c64590222798bb761d5b6d8e72950