nuclei-templates/http/misconfiguration/rabbitmq-exporter-metrics.yaml

35 lines
890 B
YAML

id: rabbitmq-exporter-metrics
info:
name: RabbitMQ Exporter
author: DhiyaneshDk
severity: low
description: RabbitMQ Exporter is exposed.
classification:
cpe: cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: vmware
product: rabbitmq
shodan-query: title:"RabbitMQ Exporter"
tags: rabbitmq,exposure,debug,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/metrics"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "rabbitmq_up"
- "rabbitmq_exporter_build_info"
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220449615637054a9b5707aaa02ddb9d5b9d065c335db7b0ac2f2c5201eb14b5578022100fcda62a508d73344b1d6f4887f1a303dc00d25522f09f2fe7ef354709ab969e5:922c64590222798bb761d5b6d8e72950