29 lines
562 B
YAML
29 lines
562 B
YAML
id: kubeview-dashboard
|
|
|
|
info:
|
|
name: KubeView Dashboard Exposure
|
|
author: ja1sh
|
|
severity: low
|
|
description: |
|
|
An attacker can detect the public instance of a KubeView dashboard
|
|
metadata:
|
|
verified: "true"
|
|
shodan-query: http.favicon.hash:-379154636
|
|
tags: exposure,k8s,kubernetes,kubeview,dashboard
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- <title>KubeView</title>
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|