Files
nuclei-templates/http/misconfiguration/exposed-docker-api.yaml
2024-12-01 13:57:55 +00:00

34 lines
798 B
YAML

id: exposed-docker-api
info:
name: Exposed Docker API
author: furkansenan,dwisiswant0
severity: info
metadata:
max-request: 2
tags: docker,unauth,devops,misconfig
http:
- method: GET
path:
- "http://{{Hostname}}/version"
- "http://{{Hostname}}/v1.24/version"
matchers-condition: and
matchers:
- type: word
words:
- "application/json"
part: header
- type: word
words:
- "KernelVersion"
- "BuildTime"
condition: and
part: body
- type: status
status:
- 200
# digest: 4a0a00473045022100823d9900bfaa84bba89e0ab054a27ad26ec42e9b416bbb864f7d72355f68853e0220696fd89b4d45c920674c723bd80b3eb264458f3a09d653d5141199657eda07d6:922c64590222798bb761d5b6d8e72950