nuclei-templates/exposures/configs/codeception-config.yaml

32 lines
631 B
YAML

id: codeception-config
info:
name: Codeception YAML Configuration File - Detect
author: DhiyaneshDk
severity: low
description: Codeception YAML configuration file was detected.
metadata:
verified: true
shodan-query: html:"codeception.yml"
tags: exposure,devops,codeception,config,cicd
requests:
- method: GET
path:
- "{{BaseURL}}/codeception.yml"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "paths:"
- "settings:"
condition: and
- type: status
status:
- 200
# Enhanced by md on 2023/02/08