Nuclei Template:
id: server-status-check
info:
name: Apache Server-Status Endpoint Detection
author: ProjectDiscoveryAI
severity: info
description: |
Nuclei Template:
id: server-status-check
info:
name: Apache Server-Status Endpoint Detection
author: ProjectDiscoveryAI
severity: info
description: |
7 | |
11 | |
13 | |
15 | |
17 | |
19 | |
20 | |
21 | |
22 | |
23 |
graph TD;
Nuclei-Templates--> Customization;
Nuclei-Templates--> Automation;
Nuclei-Templates--> Collaboration;
Customization--> id1(No code, Simple as Editing a text file);
Automation--> Scan;
Automation--> Triage;
Automation--> Retest;
Automation--> Regression;
${ctx:loginId} | |
${map:type} | |
${filename} | |
${date:MM-dd-yyyy} | |
${docker:containerId} | |
${docker:containerName} | |
${docker:imageName} | |
${env:USER} | |
${event:Marker} | |
${mdc:UserId} |
gist-testing22gist-testing22gist-testing22gist-testing22 | |
gist-testing22 |
1 |
so, you can read WEB-INF/web.xml. how can you escalate this issue? | |
[step 1]. try to read other common Java files such as WEB-INF/web-jetty.xml. | |
use a specialized wordlist such as the following (from Sergey Bobrov/BlackFan): | |
https://github.com/BlackFan/WEB-INF-dict/blob/master/web-inf.txt | |
with time you can build your own wordlist adding files you've discovered over time. | |
use Burp Intruder for this, it's perfect for this job. | |
sort Intruder results by status code so you can see instantly which files were found. |
id: detect-all-takeovers | |
info: | |
name: Subdomain takeover finder | |
author: melbadry9 | |
severity: high | |
# update this list with new takeovers matchers | |
# do not delete other template files for takeover |
https://github.com/search?q=BROWSER_STACK_ACCESS_KEY= OR BROWSER_STACK_USERNAME= OR browserConnectionEnabled= OR BROWSERSTACK_ACCESS_KEY=&s=indexed&type=Code | |
https://github.com/search?q=CHROME_CLIENT_SECRET= OR CHROME_EXTENSION_ID= OR CHROME_REFRESH_TOKEN= OR CI_DEPLOY_PASSWORD= OR CI_DEPLOY_USER=&s=indexed&type=Code | |
https://github.com/search?q=CLOUDAMQP_URL= OR CLOUDANT_APPLIANCE_DATABASE= OR CLOUDANT_ARCHIVED_DATABASE= OR CLOUDANT_AUDITED_DATABASE=&s=indexed&type=Code | |
https://github.com/search?q=CLOUDANT_ORDER_DATABASE= OR CLOUDANT_PARSED_DATABASE= OR CLOUDANT_PASSWORD= OR CLOUDANT_PROCESSED_DATABASE=&s=indexed&type=Code | |
https://github.com/search?q=CONTENTFUL_PHP_MANAGEMENT_TEST_TOKEN= OR CONTENTFUL_TEST_ORG_CMA_TOKEN= OR CONTENTFUL_V2_ACCESS_TOKEN=&s=indexed&type=Code | |
https://github.com/search?q=-DSELION_BROWSER_RUN_HEADLESS= OR -DSELION_DOWNLOAD_DEPENDENCIES= OR -DSELION_SELENIUM_RUN_LOCALLY=&s=indexed&type=Code | |
https://github.com/search?q=ELASTICSEARCH_PASSWORD= OR ELASTICSEARCH_USERNAME= OR EMAIL_NOTIFI |