nuclei-templates/http/misconfiguration/apache-druid-unauth.yaml

32 lines
828 B
YAML

id: apache-druid-unauth
info:
name: Apache Druid Unauth
author: DhiyaneshDk
severity: low
description: Apache Druid is exposed to external users.
classification:
cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: apache
product: druid
shodan-query: title:"Apache Druid"
tags: misconfig,druid,unauth,apache
http:
- method: GET
path:
- '{{BaseURL}}/unified-console.html'
matchers-condition: and
matchers:
- type: word
words:
- '<title>Apache Druid</title>'
- type: status
status:
- 200
# digest: 4a0a00473045022100db869b38afa44e0f929ab97c32a61778905d5df7e27727aa3bdc40bb7d64827a02207caf0036d1313294359e324b8b33011c8aae3f78bbef44bb2418e031fd97df83:922c64590222798bb761d5b6d8e72950