nuclei-templates/http/misconfiguration/unauth-apache-kafka-ui.yaml

39 lines
1.1 KiB
YAML
Raw Normal View History

2023-03-18 22:07:09 +00:00
id: unauth-apache-kafka-ui
info:
name: Apache Kafka - Unauthorized UI Exposure
author: theamanrawat
severity: medium
description: Unauthorized access to apache kakfa UI.
reference:
- https://www.acunetix.com/vulnerabilities/web/apache-kafka-unauthorized-access-vulnerability
- https://github.com/provectus/kafka-ui
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*
2023-03-18 22:07:09 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 2
2024-09-10 08:22:50 +00:00
vendor: apache
2024-09-10 09:08:16 +00:00
product: kafka
shodan-query: http.title:"UI for Apache Kafka"
2023-03-18 22:07:09 +00:00
tags: misconfig,apache,kafka,unauth,exposure
http:
2023-03-18 22:07:09 +00:00
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/ui/clusters/kafka-ui/brokers'
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2023-03-18 22:07:09 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>UI for Apache Kafka</title>'
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 490a0046304402206dc7661e71e13acc62d018addc835358ef65e810a2e9bbfb63ec620570a91fb40220099ee2861417d99fb781d6b7bbf052a89d73f4e01834a0c466374a568a178513:922c64590222798bb761d5b6d8e72950