From 0e7a1483c85c82d7c05bc34e87216648339392d4 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 16 Jun 2022 01:29:46 +0530 Subject: [PATCH] Update magento-2-exposed-api.yaml --- vulnerabilities/magento/magento-2-exposed-api.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/vulnerabilities/magento/magento-2-exposed-api.yaml b/vulnerabilities/magento/magento-2-exposed-api.yaml index 57e53632c6..ddf8e7633a 100644 --- a/vulnerabilities/magento/magento-2-exposed-api.yaml +++ b/vulnerabilities/magento/magento-2-exposed-api.yaml @@ -7,6 +7,8 @@ info: description: The API in Magento 2 can be accessed by the world without providing credentials. Through the API information like storefront, (hidden) products including prices are exposed. reference: - https://support.hypernode.com/en/ecommerce/magento-2/how-to-protect-the-magento-2-api + metadata: + shodan-query: http.component:"Magento" tags: magento requests: