Skip to content

Dockerrun AWS Configuration Page - Detect

ID: amazon-docker-config

Severity: medium

Author: pdteam

Tags: config,exposure,aws,devops

Dockerrun AWS configuration page was detected.

id: amazon-docker-config
info:
name: Dockerrun AWS Configuration Page - Detect
author: pdteam
severity: medium
description: Dockerrun AWS configuration page was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
metadata:
max-request: 1
tags: config,exposure,aws,devops
http:
- method: GET
path:
- '{{BaseURL}}/Dockerrun.aws.json'
matchers:
- type: word
words:
- 'AWSEBDockerrunVersion'
- 'containerDefinitions'
condition: and
# digest: 4a0a0047304502202fa3a51d95b2cfbfb07cbe63210098406077f8e96e54ee993a6a49edafae5b60022100a11e8cf3fbd6eb97bfe13736d472a5982ccc9bc954cc91e847505af510ca0cec:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/amazon-docker-config.yaml"

View on Github