Files
nuclei-templates/http/misconfiguration/apache/apache-server-status-localhost.yaml
2024-05-17 15:24:58 -07:00

42 lines
1.0 KiB
YAML

---
id: apache-server-status-localhost
info:
name: Server Status Disclosure
author: pdteam,geeknik,NaN-kl
severity: low
description: Apache Server Status page is exposed, which may contain information
about pages visited by the users, their IPs or sensitive information such as
session tokens.
metadata:
max-request: 2
tags: apache,debug,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/server-status"
matchers:
- type: status
status:
- 403
- 404
- method: GET
headers:
Forwarded: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Forwarded-By: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Forwarded-For-IP: 127.0.0.1
X-Forwarded-Host: 127.0.0.1
X-Host: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-True-IP: 127.0.0.1
path:
- "{{BaseURL}}/server-status"
matchers:
- type: word
words:
- Apache Server Status
- Server Version
condition: and