nuclei-templates/http/misconfiguration/gopher-server.yaml

33 lines
841 B
YAML

id: gopher-server
info:
name: Gopher Server - Exposure
author: DhiyaneshDk
severity: medium
description: Gopher Server is exposed.
reference:
- https://www.facebook.com/photo/?fbid=627579942745862&set=a.467014098802448
metadata:
verified: true
max-request: 1
shodan-query: title:"Gopher Server"
tags: misconfig,gopher,server
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Gopher Server'
- 'Environment Variables'
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502207873bb8bf010c666f17f7e27467b597759e064d060fe7bdf2b43c37fc68c4b56022100d6d0e50a817de6f7dd0593ad1cdda5c6fea32d3dd1f2dc8440ac11ebddcf93ba:922c64590222798bb761d5b6d8e72950