nuclei-templates/exposures/configs/codeception-config.yaml

29 lines
534 B
YAML

id: codeception-config
info:
name: Codeception YAML Configuration File Exposure
author: DhiyaneshDk
severity: low
metadata:
verified: true
shodan-query: html:"codeception.yml"
tags: exposure,devops,codeception,config,cicd
requests:
- method: GET
path:
- "{{BaseURL}}/codeception.yml"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "paths:"
- "settings:"
condition: and
- type: status
status:
- 200