nuclei-templates/http/technologies/apache/airflow-detect.yaml

28 lines
652 B
YAML

id: airflow-detect
info:
name: Apache Airflow
author: pdteam
severity: info
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Apache Airflow"
tags: tech,apache,airflow,intrusive
http:
- method: GET
path:
- "{{BaseURL}}/{{randstr}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Airflow 404"
- type: status
status:
- 404
# digest: 4a0a00473045022100ed59cfb6802724e34fa5894563277a64889f3676ae6cdae4875a59bfd9e5366a02207589bb03b56a052916e5db355e492f5168909e2051039e97f66022052d90d590:922c64590222798bb761d5b6d8e72950