Files
nuclei-templates/http/misconfiguration/hivequeue-agent.yaml
2024-12-01 13:57:55 +00:00

36 lines
883 B
YAML

id: hivequeue-agent
info:
name: HiveQueue Agent
author: DhiyaneshDk
severity: low
description: HiveQueue Agent is exposed.
reference:
- https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5555061814557647/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"HiveQueue"
tags: misconfig,hivequeue
http:
- method: GET
path:
- "{{BaseURL}}/monitoring"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>HiveQueue Agent</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4b0a00483046022100dd0b75f8a18f7d0a6044542afd3ab3b5368a18a2fe4ec9b40999d42f8c7f1af802210095d7ab8985ff92834fce8f6ad290943c7f1d2b452afc45fb32c659a9343a5f16:922c64590222798bb761d5b6d8e72950