nuclei-templates/http/exposed-panels/concourse-ci-panel.yaml

33 lines
965 B
YAML

id: concourse-ci-panel
info:
name: Concourse CI Login Panel - Detect
author: praetorian-thendrickson
severity: info
description: Concourse CI login panel was detected.
reference:
- https://github.com/concourse/concourse
- https://concourse-ci.org
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:pivotal_software:concourse:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Concourse"
product: concourse
vendor: pivotal_software
tags: panel,concourse,oss
http:
- method: GET
path:
- '{{BaseURL}}'
matchers:
- type: word
words:
- '<title>Concourse</title>'
- 'login to Concourse'
condition: or
# digest: 490a004630440220148d301125e07268e66944f54359e1da36ef381163a2e4b3ebe46de10d3b02fe02203574d59ca3a08547943d6cb63cb988e85a40258d1882f1c6dc3d859734bc6048:922c64590222798bb761d5b6d8e72950