nuclei-templates/http/misconfiguration/jaeger-ui-dashboard.yaml

40 lines
1.1 KiB
YAML

id: jaeger-ui-dashboard
info:
name: Jaeger UI
author: dhiyaneshDK,righettod
severity: low
description: Jaeger UI dashboard is exposed.
reference:
- https://www.jaegertracing.io/
classification:
cpe: cpe:2.3:a:jaegertracing:jaeger_ui:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: jaegertracing
product: jaeger_ui
shodan-query: http.title:"Jaeger UI"
tags: misconfig
http:
- method: GET
path:
- '{{BaseURL}}/search'
- '{{BaseURL}}/api/services'
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "<title>jaeger ui", "jaeger_version", "jaeger_config_js", "jaeger-ui-root", "jaeger-query")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)"gitVersion":\s*"([a-z0-9.]+)"'
# digest: 4a0a00473045022100d00925ed66d11c904957f16869b85c7fd5be12f3669a280fb01951b988e53a6802206f7f15bfbb4aa0541306bbc588f63448e1d185e062b7e9b0a6236369ad3398bd:922c64590222798bb761d5b6d8e72950