Files
nuclei-templates/http/misconfiguration/django-debug-detect.yaml

29 lines
865 B
YAML
Raw Normal View History

2020-09-13 22:55:10 +05:30
id: django-debug
info:
2024-01-30 11:47:24 +01:00
name: Django Debug Configuration Enabled
2021-06-09 17:50:56 +05:30
author: dhiyaneshDK,hackergautam
2020-09-14 15:33:10 +05:30
severity: medium
2024-01-30 11:47:24 +01:00
description: Django debug configuration is enabled, which allows an attacker to obtain system configuration information such as paths or settings.
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: django,debug,misconfig
2020-09-13 22:55:10 +05:30
http:
2020-09-13 22:55:10 +05:30
- method: GET
path:
2021-04-17 19:05:45 +05:30
- "{{BaseURL}}/NON_EXISTING_PATH/"
2020-09-13 22:55:10 +05:30
2020-09-14 15:33:10 +05:30
matchers-condition: and
2020-09-13 22:55:10 +05:30
matchers:
- type: word
words:
- URLconf defined
2020-09-14 15:33:10 +05:30
- Page not found
2021-04-17 19:05:45 +05:30
- Django tried these URL patterns, in this order
2020-09-13 22:55:10 +05:30
condition: and
2020-09-14 15:33:10 +05:30
- type: status
status:
2023-10-14 16:57:55 +05:30
- 404
2024-12-01 13:57:55 +00:00
# digest: 490a0046304402201ad1f8c4c935ca3b36144431479e9cec7a1f8034256ca227ba077c8f1c206bf302202e6249657ecbd2be3a8dfccb03216e8f655ecbae168567ccd966dd4124eb2f08:922c64590222798bb761d5b6d8e72950