diff --git a/security-misconfiguration/apache-tomcat-snoop.yaml b/security-misconfiguration/apache-tomcat-snoop.yaml new file mode 100644 index 0000000000..7d38d50ee6 --- /dev/null +++ b/security-misconfiguration/apache-tomcat-snoop.yaml @@ -0,0 +1,24 @@ +id: apache-tomcat-snoop + +info: + name: Apache Tomcat example page disclosure - snoop + author: pdteam + severity: low + description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection. + + # Reference:- https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks + +requests: + - method: GET + path: + - "{{BaseURL}}/examples/jsp/snp/snoop.jsp" + + matchers-condition: and + matchers: + - type: word + words: + - 'Request URI: /examples/jsp/snp/snoop.jsp' + + - type: status + status: + - 200 \ No newline at end of file