nuclei-templates/http/misconfiguration/exposed-kibana.yaml

31 lines
692 B
YAML

id: exposed-kibana
info:
name: Exposed Kibana
author: Shine
severity: medium
metadata:
max-request: 3
tags: kibana,unauth,misconfig
http:
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/app/kibana'
- '{{BaseURL}}/app/kibana/'
matchers-condition: and
matchers:
- type: word
words:
- 'kibanaWelcomeView'
- 'kibanaWelcomeLogo'
- 'kibanaWelcomeTitle'
- type: status
status:
- 200
# digest: 4a0a004730450220012b5d4427434ca5208bb6bee3592416e5d40e85be85ce79485d143a7c0093ca022100c72f1db4a8e03fb91c4e4154f3ce92ff5b77dba0927d9684c3bf06c7cef9d06c:922c64590222798bb761d5b6d8e72950