Files
nuclei-templates/http/misconfiguration/aws/aws-object-listing.yaml
2024-12-01 13:57:55 +00:00

47 lines
1.1 KiB
YAML

id: aws-object-listing
info:
name: AWS bucket with Object listing
author: pdteam
severity: low
description: Object listing is enabled in AWS bucket.
reference:
- https://mikey96.medium.com/cloud-based-storage-misconfigurations-critical-bounties-361647f78a29
metadata:
max-request: 1
tags: aws,misconfig,bucket
http:
- method: GET
path:
- "{{BaseURL}}"
max-size: 1000
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<ListBucketResult xmlns='
- type: word
part: header
words:
- application/xml
- type: word
part: header
words:
- "x-goog-metageneration"
- "x-goog-generation"
case-insensitive: true
negative: true
extractors:
- type: regex
part: body
group: 1
regex:
- '<Name>([a-z0-9-._]+)'
# digest: 4a0a00473045022100a71b90649ec567adc33aa85dd363003be175e7fe5868e1fd9a50f948bbc13a54022045d7f7618f36f59f8c4cbb702717ff3d33426ba498125b01068d8f010f57390c:922c64590222798bb761d5b6d8e72950