nuclei-templates/http/misconfiguration/hivequeue-agent.yaml

36 lines
881 B
YAML

id: hivequeue-agent
info:
name: HiveQueue Agent
author: DhiyaneshDk
severity: low
description: HiveQueue Agent is exposed.
reference:
- https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5555061814557647/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"HiveQueue"
tags: misconfig,hivequeue
http:
- method: GET
path:
- "{{BaseURL}}/monitoring"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>HiveQueue Agent</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100c83f5b80ea7847efd5569b8fc2f4fca944f9253c21348479a56634720ca73ee3022078b07b11d30eb932f0c8e955eeaf21478dd5ad8ef9f9255667df55aae574aaa8:922c64590222798bb761d5b6d8e72950