nuclei-templates/http/technologies/hashicorp-vault-detect.yaml

24 lines
584 B
YAML

id: hashicorp-vault-detect
info:
name: HashiCorp Vault Detect
author: Adam Crosser
severity: info
description: Detects HashiCorp Vault
metadata:
max-request: 1
tags: tech,hashicorp
http:
- method: GET
path:
- "{{BaseURL}}/ui/vault/auth"
matchers:
- type: word
part: body
words:
- '<meta name="vault/config/environment"'
# digest: 4b0a00483046022100877fc6d2edb0748eabce5482f9352c81e05cea8a516ccdd02c784e53eb1677870221009ca3d3ed3ca0c37ca9fc0c321fe32a3bfca6350f03886f754f2ecb4427515d67:922c64590222798bb761d5b6d8e72950