Prometheus Panel - Detect
ID: prometheus-exposed-panel
Severity: info
Author: organiccrap,jfbes
Tags: panel,prometheus
Description
Section titled “Description”Prometheus panel was detected.
YAML Source
Section titled “YAML Source”id: prometheus-exposed-panel
info: name: Prometheus Panel - Detect author: organiccrap,jfbes severity: info description: Prometheus panel was detected. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cwe-id: CWE-200 cpe: cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: prometheus product: prometheus tags: panel,prometheus
http: - method: GET path: - '{{BaseURL}}/graph' - "{{BaseURL}}/prometheus/graph"
stop-at-first-match: true matchers: - type: word part: body words: - '<title>Prometheus Time Series Collection and Processing Server</title>'# digest: 4a0a00473045022014edc3cb7512fa899d6e5bf19300aef9fa747546d325484ce8a68b26af1af2c20221008b4d1832c1bbe69f33a447b288b1f66edb936ad119e7ab2b023b15776f48c0d1:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposed-panels/prometheus-exposed-panel.yaml"