nuclei-templates/http/exposed-panels/jenkins-login.yaml

33 lines
797 B
YAML

id: jenkins-login
info:
name: Jenkins Login Detected
author: pdteam
severity: info
description: Jenkins is an open source automation server.
remediation: Ensure proper access.
reference:
- https://www.jenkins.io/doc/book/security/
classification:
cwe-id: CWE-200
metadata:
max-request: 1
vendor: jenkins
product: jenkins
tags: panel,jenkins
http:
- method: GET
path:
- '{{BaseURL}}/login'
matchers-condition: and
matchers:
- type: word
words:
- 'Sign in [Jenkins]'
- type: status
status:
- 200
# digest: 4a0a00473045022100d976f7ba52a1fc932193c1e0786560d7014129f2ff51188ca9430c0ab3f4466102207c87861a0a308b21141d84c1d8c3786ca027ebe6b445f64833ef266bb5f6419c:922c64590222798bb761d5b6d8e72950