Skip to content

Kiali - Detect

ID: kiali-panel

Severity: info

Author: righettod

Tags: panel,kiali,detect,login

kiali panel was detected.

id: kiali-panel
info:
name: Kiali - Detect
author: righettod
severity: info
description: |
kiali panel was detected.
reference:
- https://kiali.io/
classification:
cpe: cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: kiali
product: kiali
shodan-query: title:"Kiali"
tags: panel,kiali,detect,login
http:
- method: GET
path:
- "{{BaseURL}}/kiali/api/status"
- "{{BaseURL}}/kiali/"
host-redirects: true
max-redirects: 2
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "kiali-ui", "<title>kiali", "kiali version")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)"Kiali version":\s*"([a-z0-9.]+)"'
# digest: 4b0a00483046022100ae02b68b8b0550c59070361f28fea813562794d5bbf51415be64da507aa46e0e0221009383472a020ea6faaf0c6fa4fc8bcd79538628f344e58e2a76dfa0e09efe5fb1:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/kiali-panel.yaml"

View on Github