diff --git a/exposures/configs/prometheus-targets-endpoint.yaml b/exposures/configs/prometheus-targets-endpoint.yaml index 9d29d621c6..e5adf58b1a 100644 --- a/exposures/configs/prometheus-targets-endpoint.yaml +++ b/exposures/configs/prometheus-targets-endpoint.yaml @@ -3,9 +3,9 @@ id: prometheus-targets-endpoint info: name: Exposure of sensitive operational information via Prometheus targets API endpoint author: geeknik + severity: high description: The targets endpoint exposes services belonging to the infrastructure, including their roles and labels. In addition to showing the target machine addresses, the endpoint also exposes metadata labels that are added by the target provider. These labels are intended to contain non-sensitive values, like the name of the server or its description, but various cloud platforms may automatically expose sensitive data in these labels, oftentimes without the developer’s knowledge. reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ - severity: high tags: prometheus,exposure requests: @@ -18,8 +18,14 @@ requests: - type: status status: - 200 + + - type: word words: - - "Endpoint" - - "State" - - "Labels" + - '{"status":"success","data":' + - 'Labels' condition: and + + - type: word + part: header + words: + - 'application/json'