nuclei-templates/misconfiguration/kubernetes-pods.yaml

29 lines
779 B
YAML

id: kubernetes-pods-api
info:
name: Kubernetes Pods API
author: ilovebinbash & geeknik & 0xtavian
severity: critical
description: When the service port is available, anyone can execute commands inside the container. See https://github.com/officialhocc/Kubernetes-Kubelet-RCE for inspiration.
reference: https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/
requests:
- method: GET
path:
- '{{BaseURL}}/pods'
- '{{BaseURL}}/api/v1/pods'
- '{{BaseURL}}:10250/pods'
matchers-condition: and
matchers:
- type: word
words:
- "apiVersion"
part: body
- type: word
words:
- "application/json"
part: header
- type: status
status:
- 200