From afdb96a7a5caa90d222856ace8f7e6f3d4bf646e Mon Sep 17 00:00:00 2001 From: eremit4 <37265495+eremit4@users.noreply.github.com> Date: Thu, 30 Mar 2023 14:41:00 -0300 Subject: [PATCH 1/5] Create tomcat-exposed-examples.yaml Template to detect Apache Tomcat /examples/ directory --- .../tomcat/tomcat-exposed-examples.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 exposed-panels/tomcat/tomcat-exposed-examples.yaml diff --git a/exposed-panels/tomcat/tomcat-exposed-examples.yaml b/exposed-panels/tomcat/tomcat-exposed-examples.yaml new file mode 100644 index 0000000000..41c29fd940 --- /dev/null +++ b/exposed-panels/tomcat/tomcat-exposed-examples.yaml @@ -0,0 +1,35 @@ +id: tomcat-exposed-examples + +info: + name: Tomcat exposed examples + description: Apache Tomcat default installation contains the "/examples" directory which has many example servlets and JSPs. Some of these examples are a security risk and should not be deployed on a production server. + author: Higor Melgaço + reference: + - https://www.acunetix.com/vulnerabilities/web/apache-tomcat-examples-directory-vulnerabilities/ + - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks/ + severity: medium + tags: tomcat,examples + +requests: + - method: GET + path: + - '{{BaseURL}}/examples/' + + matchers-condition: and + matchers: + - type: word + words: + - 'Apache Tomcat Examples' + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '