Files
nuclei-templates/http/misconfiguration/gopher-server.yaml
2024-12-01 13:57:55 +00:00

33 lines
841 B
YAML

id: gopher-server
info:
name: Gopher Server - Exposure
author: DhiyaneshDk
severity: medium
description: Gopher Server is exposed.
reference:
- https://www.facebook.com/photo/?fbid=627579942745862&set=a.467014098802448
metadata:
verified: true
max-request: 1
shodan-query: title:"Gopher Server"
tags: misconfig,gopher,server
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Gopher Server'
- 'Environment Variables'
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450221008021185dc24ac215b4da11c2ec0f6b3d94cd4279555a36bc54e27d15e55d029302203fa70ee7e8f6c1e3d11fbf5670bb771c0109b389d5af4dfd164c123ceafc34cc:922c64590222798bb761d5b6d8e72950