diff --git a/http/misconfiguration/mongod-exposure.yaml b/http/misconfiguration/mongod-exposure.yaml new file mode 100644 index 0000000000..63f31023e3 --- /dev/null +++ b/http/misconfiguration/mongod-exposure.yaml @@ -0,0 +1,30 @@ +id: mongod-exposure + +info: + name: MongoD Server - Exposure + author: DhiyaneshDk + severity: low + metadata: + verified: true + max-request: 1 + shodan-query: html:"mongod" + tags: mongod,exposure,info-leak + +http: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "mongod" + - "List all commands" + condition: and + + - type: status + status: + - 200