nuclei-templates/exposed-panels/kubeview-dashboard.yaml

29 lines
562 B
YAML

id: kubeview-dashboard
info:
name: KubeView Dashboard Exposure
author: ja1sh
severity: low
description: |
An attacker can detect the public instance of a KubeView dashboard
metadata:
verified: "true"
shodan-query: http.favicon.hash:-379154636
tags: exposure,k8s,kubernetes,kubeview,dashboard
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- <title>KubeView</title>
- type: status
status:
- 200