nuclei-templates/http/exposures/configs/codeception-config.yaml

31 lines
614 B
YAML

id: codeception-config
info:
name: Codeception YAML Configuration File - Detect
author: DhiyaneshDk
severity: low
description: Codeception YAML configuration file was detected.
metadata:
max-request: 1
verified: true
shodan-query: html:"codeception.yml"
tags: exposure,devops,codeception,config,cicd
http:
- method: GET
path:
- "{{BaseURL}}/codeception.yml"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "paths:"
- "settings:"
condition: and
- type: status
status:
- 200