nuclei-templates/http/exposures/logs/production-logs.yaml

43 lines
1.0 KiB
YAML

id: production-logs
info:
name: Discover production log files
author: geeknik
severity: info
description: Production log file was exposed.
metadata:
max-request: 3
tags: exposure,logs,rails
http:
- method: GET
path:
- "{{BaseURL}}/log/production.log"
- "{{BaseURL}}/logs/production.log"
- "{{BaseURL}}/production.log"
matchers-condition: and
matchers:
- type: word
words:
- "Connecting to database specified by database.yml"
- "Started GET"
condition: and
- type: status
status:
- 200
- type: word
part: header
words:
- "text/html"
negative: true
extractors:
- type: regex
name: last_modified
part: header
regex:
- 'Last-Modified:.*'
# digest: 4a0a004730450220069d9de39e4fbf696ec729078008a9f91411dc7d037e66c89ff96e23c973bc02022100d29de74e008f3ca4ef3e4b650f02b572d184e0a9de3380eab4a37cb6b35b25ab:922c64590222798bb761d5b6d8e72950