nuclei-templates/http/exposed-panels/hadoop-exposure.yaml

27 lines
731 B
YAML

id: hadoop-exposure
info:
name: Apache Hadoop Panel - Detect
author: pdteam
severity: info
description: Apache Hadoop panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
vendor: apache
product: hadoop
max-request: 1
tags: panel,apache,hadoop
http:
- method: GET
path:
- '{{BaseURL}}/dfshealth.html'
matchers:
- type: word
words:
- '<div class="navbar-brand">Hadoop</div>'
# digest: 4b0a00483046022100bae7c0bd056bb51acc9aca045fad155cc924c4e2f3ff1f0b5a564b671cc99ed2022100b201753d53d4cd3acc12ea9ed53f859438347eb08c07ad9832080345e0784c6c:922c64590222798bb761d5b6d8e72950