nuclei-templates/misconfiguration/exposed-kibana.yaml

25 lines
452 B
YAML
Raw Normal View History

2020-07-24 10:13:10 +00:00
id: exposed-kibana
2020-07-24 09:22:22 +00:00
info:
name: Exposed Kibana
author: Shine
severity: medium
2021-03-12 08:57:14 +00:00
tags: kibana,unauth
2020-07-24 09:22:22 +00:00
requests:
- method: GET
path:
2021-01-14 14:41:56 +00:00
- '{{BaseURL}}'
2020-07-24 09:22:22 +00:00
- '{{BaseURL}}/app/kibana/'
matchers-condition: and
matchers:
- type: word
words:
2020-07-24 10:13:10 +00:00
- 'kibanaWelcomeView'
- 'cluster_uuid'
- 'kibanaWelcomeLogo'
- 'kibanaWelcomeTitle'
2020-07-24 09:22:22 +00:00
- type: status
status:
2020-07-24 10:13:10 +00:00
- 200