nuclei-templates/http/exposures/files/uwsgi-ini.yaml

32 lines
738 B
YAML

id: uwsgi-ini
info:
name: uwsgi.ini File Exposure
author: DhiyaneshDK
severity: info
classification:
cpe: cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: unbit
product: uwsgi
shodan-query: html:"uwsgi.ini"
tags: exposure,uwsgi,files
http:
- method: GET
path:
- "{{BaseURL}}/uwsgi.ini"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '[uwsgi]'
- type: status
status:
- 200
# digest: 4a0a0047304502202550cabdada2bb948f8c1eab2050efe17b92370648fee56b360acc89550c3cfc022100b1c528745aeb59bbccc6d5caa81dec229710636769735e102f7517a51a1c1cb5:922c64590222798bb761d5b6d8e72950