Files
nuclei-templates/http/technologies/hashicorp-vault-detect.yaml
2024-12-01 13:57:55 +00:00

22 lines
580 B
YAML

id: hashicorp-vault-detect
info:
name: HashiCorp Vault Detect
author: Adam Crosser
severity: info
description: Detects HashiCorp Vault
metadata:
max-request: 1
tags: tech,hashicorp
http:
- method: GET
path:
- "{{BaseURL}}/ui/vault/auth"
matchers:
- type: word
part: body
words:
- '<meta name="vault/config/environment"'
# digest: 4a0a004730450220593801062183093fc6a53a99ee465f6884ab66cb4a3c89ffb0b3b59d816267cd022100b905cf3b4fcf4df1422a1dd309d2f20d986d6dc45fe52f014f3a862ba9bb9706:922c64590222798bb761d5b6d8e72950