moving apache templates to apache directory
parent
45073c7b88
commit
80db01c68c
|
@ -1,13 +1,14 @@
|
||||||
id: apache-filename-brute-force
|
id: apache-filename-enum
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Filename Brute Force
|
name: Apache Filename Enumeration
|
||||||
author: geeknik
|
author: geeknik
|
||||||
description: If the client provides an invalid Accept header, the server will respond with a 406 Not Acceptable error containing a pseudo directory listing.
|
description: If the client provides an invalid Accept header, the server will respond with a 406 Not Acceptable error containing a pseudo directory listing.
|
||||||
reference:
|
reference:
|
||||||
- https://hackerone.com/reports/210238
|
- https://hackerone.com/reports/210238
|
||||||
- https://www.acunetix.com/vulnerabilities/web/apache-mod_negotiation-filename-bruteforcing/
|
- https://www.acunetix.com/vulnerabilities/web/apache-mod_negotiation-filename-bruteforcing/
|
||||||
severity: low
|
severity: low
|
||||||
tags: apache
|
tags: apache,misconfig
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Apache Hbase Unauth
|
name: Apache Hbase Unauth
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: apache,unauth
|
tags: apache,unauth,misconfig
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Apache Storm Unauth
|
name: Apache Storm Unauth
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: apache,unauth
|
tags: apache,unauth,misconfig
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -15,13 +15,15 @@ requests:
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
part: body
|
||||||
words:
|
words:
|
||||||
- '\"totalMem\":'
|
- '"totalMem":'
|
||||||
- '\"stormVersion\":'
|
- '"stormVersion":'
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
part: header
|
||||||
words:
|
words:
|
||||||
- 'text/plain'
|
- 'text/plain'
|
||||||
part: header
|
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: low
|
severity: low
|
||||||
description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection.
|
description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection.
|
||||||
reference: https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks
|
reference: https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks
|
||||||
tags: apache
|
tags: apache,misconfig
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
Loading…
Reference in New Issue