nuclei-templates/http/misconfiguration/exposed-kibana.yaml

30 lines
726 B
YAML
Raw Normal View History

2020-07-24 10:13:10 +00:00
id: exposed-kibana
2020-07-24 09:22:22 +00:00
info:
name: Exposed Kibana
author: Shine
severity: medium
2024-01-03 06:08:41 +00:00
description: Kibana is exposed.
metadata:
max-request: 3
tags: kibana,unauth,misconfig
2020-07-24 09:22:22 +00:00
http:
2020-07-24 09:22:22 +00:00
- method: GET
path:
2021-01-14 14:41:56 +00:00
- '{{BaseURL}}'
2023-07-12 05:48:40 +00:00
- '{{BaseURL}}/app/kibana'
2020-07-24 09:22:22 +00:00
- '{{BaseURL}}/app/kibana/'
matchers-condition: and
matchers:
- type: word
words:
2020-07-24 10:13:10 +00:00
- 'kibanaWelcomeView'
- 'kibanaWelcomeLogo'
- 'kibanaWelcomeTitle'
2023-10-14 11:27:55 +00:00
2020-07-24 09:22:22 +00:00
- type: status
status:
2023-07-11 03:09:41 +00:00
- 200
# digest: 4b0a00483046022100b52b7139c28f408b3f87c345e0e90dda97170391bd22bda2e55e7c0ec9ad4982022100d7400c8483524ff3c6d0401b37b77f888c3d9b3767e964ccd898ce3d6604759d:922c64590222798bb761d5b6d8e72950