nuclei-templates/http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml

27 lines
662 B
YAML

id: unauthenticated-jenkins
info:
name: Unauthenticated Jenkins Dashboard
author: dhiyaneshDK
severity: high
description: Jenkins Dashboard is exposed to external users.
metadata:
max-request: 1
tags: jenkins
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
words:
- Dashboard [Jenkins]
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100fdadef7a0033dd96c82c0343a62b892b6169b5b5be972ca6c62384fe03907b0d0221008acb50f988c15098ac252275d90b4bcbd721d166cfee91467b43df238c827139:922c64590222798bb761d5b6d8e72950