nuclei-templates/http/exposed-panels/kiali-panel.yaml

43 lines
1.1 KiB
YAML

id: kiali-panel
info:
name: Kiali - Detect
author: righettod
severity: info
description: |
kiali panel was detected.
reference:
- https://kiali.io/
classification:
cpe: cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: kiali
product: kiali
shodan-query: title:"Kiali"
tags: panel,kiali,detect,login
http:
- method: GET
path:
- "{{BaseURL}}/kiali/api/status"
- "{{BaseURL}}/kiali/"
host-redirects: true
max-redirects: 2
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "kiali-ui", "<title>kiali", "kiali version")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)"Kiali version":\s*"([a-z0-9.]+)"'
# digest: 4b0a00483046022100feabc099327aefc127052132e8d4cc0c447571966798b5bdc199cfa8cda7470a022100ebb403105656fe74211e458eb7e897ccaf871cf68eba5e634bf82e964ccf6d75:922c64590222798bb761d5b6d8e72950