nuclei-templates/http/vulnerabilities/other/spark-webui-unauth.yaml

33 lines
833 B
YAML

id: spark-webui-unauth
info:
name: Unauthenticated Spark WebUI
author: princechaddha
severity: medium
description: Spark WebUI is exposed to external users without any authentication.
reference:
- https://github.com/vulhub/vulhub/tree/master/spark/unacc
metadata:
max-request: 1
tags: unauth,vulhub,spark
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<title>Spark Master at spark://"
- "<strong>URL:</strong>"
part: body
condition: and
# digest: 4a0a004730450220270869b1b7fd1729ea28140dbf8a434ca5b2b341dd040852601e1b37cd1e8499022100942b17a3cf90e2d877e8ffed244ff81baa455305d50bfbf4e5c9f90ad08771e7:922c64590222798bb761d5b6d8e72950