nuclei-templates/http/misconfiguration/debug/github-debug.yaml

32 lines
746 B
YAML

id: github-debug
info:
name: GitHub Debug Page
author: ritikchaddha
severity: info
classification:
cpe: cpe:2.3:a:github:github:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: github
product: github
shodan-query: http.title:"GitHub Debug"
tags: misconfig,github,debug
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "GitHub Debug"
- type: status
status:
- 200
# digest: 4a0a004730450220093df904f50aac232610092b8bc5a397ca2f27fc3ead7f211cdb386afc0a120a022100d5ef347f696f79bebb6833d14d870f2faa47c691487cc214dde7c54965e21e31:922c64590222798bb761d5b6d8e72950