nuclei-templates/http/misconfiguration/awstats-listing.yaml

28 lines
502 B
YAML

id: awstats-listing
info:
name: AWStats Listing
author: tess
severity: low
description: Searches for exposed awstats Internal Information.
tags: misconfig,aws,exposure,amazon,awstats,oss
http:
- method: GET
path:
- "{{BaseURL}}/awstats/data"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Index of /awstats/data/'
- '">awstats'
condition: and
- type: status
status:
- 200