Files
nuclei-templates/http/misconfiguration/mongod-exposure.yaml
2026-01-27 22:20:43 +00:00

34 lines
811 B
YAML

id: mongod-exposure
info:
name: MongoD Server - Exposure
author: DhiyaneshDk
severity: low
classification:
cpe: cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: mongodb
product: mongodb
shodan-query: html:"mongod"
tags: mongod,exposure,info-leak,vuln
http:
- method: GET
path:
- "{{BaseURL}}/"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>mongod"
- "List all commands"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100c907f5dd3c0c0e558a164d29a57cca5aa83fe8cf5d3d5e0256130b93bc65755902200b91fcfd86c850d3a7335f33f4623da2df5133cc480515d204a9e6b0bf40af2b:922c64590222798bb761d5b6d8e72950