nuclei-templates/http/misconfiguration/healthchecks-ui-exposure.yaml

34 lines
798 B
YAML

id: healthchecks-ui-exposure
info:
name: Healthchecks UI Exposure
author: tess
severity: low
description: Healthchecks UI is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"Health Checks UI"
tags: misconfig,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 3
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Health Checks UI'
- 'var webhookEndpoint'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100b3400726182c8f366d7a0910a83e57aeeb6b29732a3ba753856c407008ff55820221009a29b8e57b21ae19bbdd069674b060bef164cc7f0edf274a209cb87313ec6773:922c64590222798bb761d5b6d8e72950