Skip to content

Hashicorp Consul Agent - Detect

ID: hashicorp-consul-agent

Severity: info

Author: c-sh0

Tags: tech,consul,api,panel,hashicorp

Hashicorp Consul Agent was detected.

id: hashicorp-consul-agent
info:
name: Hashicorp Consul Agent - Detect
author: c-sh0
severity: info
description: Hashicorp Consul Agent was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hashicorp
product: consul
shodan-query:
- http.title:"consul by hashicorp"
- cpe:"cpe:2.3:a:hashicorp:consul"
fofa-query: title="consul by hashicorp"
google-query: intitle:"consul by hashicorp"
tags: tech,consul,api,panel,hashicorp
http:
- method: GET
path:
- "{{BaseURL}}/v1/agent/self"
matchers:
- type: word
words:
- '"Datacenter":'
- '"Revision":'
- '"PrimaryDatacenter"'
condition: and
extractors:
- type: json
json:
- " .Config.Version"
# digest: 4a0a00473045022100a7ea236b56324521037dae4833fb6956b3603592a648f9a89de2da58ff4df653022068e5e2092641c16a53cec59a314b0bfefd20213b973a8e4446744e21313c3c17:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/hashicorp-consul-agent.yaml"

View on Github