nuclei-templates/http/misconfiguration/kubernetes/kubernetes-metrics.yaml

35 lines
875 B
YAML

id: kubernetes-metrics
info:
name: Detect Kubernetes Exposed Metrics
author: pussycat0x
severity: low
description: Information Disclosure of Garbage Collection
reference:
- https://kubernetes.io/docs/concepts/cluster-administration/system-metrics/#metrics-in-kubernetes
metadata:
max-request: 1
tags: kubernetes,exposure,devops,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/metrics"
matchers-condition: and
matchers:
- type: word
part: body
condition: and
words:
- "namespace"
- "HELP"
- "TYPE"
- "kube"
- type: status
status:
- 200
# digest: 4b0a00483046022100b75722556e94ff4f9c4231053ebe0fa19009fbc83a38f50d09d05f560dd3e069022100a579ab9a002c05e91126b9dd14bf140f004ba45b61e09a4bbdcd32aeaae32d33:922c64590222798bb761d5b6d8e72950