nuclei-templates/http/exposures/files/go-mod-disclosure.yaml

35 lines
818 B
YAML

id: go-mod-disclosure
info:
name: Go.mod Disclosure
author: DhiyaneshDk
severity: low
description: go.mod internal file is exposed.
classification:
cpe: cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: golang
product: go
shodan-query: html:"go.mod"
tags: exposure,files,go
http:
- method: GET
path:
- "{{BaseURL}}/go.mod"
matchers-condition: and
matchers:
- type: word
words:
- 'module'
- 'go'
- 'require ('
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502202aabd60c4dfe1664f15bb150eeb1a2edd119b4715d8f7ad601a72885beaf70bd022100d9f1114fe2fef0401f773468fa039d0e1557fb52144baddcbf0900e8ed00a780:922c64590222798bb761d5b6d8e72950