nuclei-templates/http/exposed-panels/kiali-panel.yaml

39 lines
984 B
YAML

id: kiali-panel
info:
name: Kiali - Detect
author: righettod
severity: info
description: |
kiali panel was detected.
reference:
- https://kiali.io/
metadata:
verified: true
max-request: 2
shodan-query: title:"Kiali"
tags: panel,kiali,detect,login
http:
- method: GET
path:
- "{{BaseURL}}/kiali/api/status"
- "{{BaseURL}}/kiali/"
host-redirects: true
max-redirects: 2
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "kiali-ui", "<title>kiali", "kiali version")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)"Kiali version":\s*"([a-z0-9.]+)"'
# digest: 4b0a00483046022100ac3d039616a98589e8fc1bdf2e20f180157d17b0261e2b32feb03f230a173010022100f493934172a48f156b2938a1b16ff870fed6e624c9480f4f9535b3d70d8a4f4b:922c64590222798bb761d5b6d8e72950