Files
nuclei-templates/http/misconfiguration/mongodb-exposure.yaml
2026-01-20 18:51:10 +00:00

33 lines
789 B
YAML

id: mongodb-exposure
info:
name: MongoDB Exposure
author: DhiyaneshDk
severity: info
description: |
Detected MongoDB instances exposed over HTTP using the native driver port.
metadata:
verified: true
max-request: 1
shodan-query: html:"access MongoDB"
tags: mongodb,exposure,misconfig
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- "access MongoDB"
- type: status
status:
- 200
# digest: 4b0a00483046022100ed543b3f6347163258bf1fa62584c8e19b7c28046853a021bdb9d3bab7c9efb2022100fbd9279ae1243410d4e8c94b3bbe64e6c8c125f10578140a6693a01ec476234e:922c64590222798bb761d5b6d8e72950