Files
nuclei-templates/http/misconfiguration/exposed-docker-api.yaml
2025-10-26 16:17:37 +00:00

34 lines
805 B
YAML

id: exposed-docker-api
info:
name: Exposed Docker API
author: furkansenan,dwisiswant0
severity: info
metadata:
max-request: 2
tags: docker,unauth,devops,misconfig,vuln
http:
- method: GET
path:
- "http://{{Hostname}}/version"
- "http://{{Hostname}}/v1.24/version"
matchers-condition: and
matchers:
- type: word
words:
- "application/json"
part: header
- type: word
words:
- "KernelVersion"
- "BuildTime"
condition: and
part: body
- type: status
status:
- 200
# digest: 4b0a0048304602210096c19ec4d8d33a0f312caae96d6e9d5f75cf13d99b7762e88f7ab4ac58ae3c26022100d4a26cfb041bede2101453d823211af91e36753ff7fd6816eea52da6f27a6336:922c64590222798bb761d5b6d8e72950