Skip to content

Bazaar Configuration - Detect

ID: exposed-bzr

Severity: info

Author: daffainfo

Tags: config,exposure

Bazaar configuration was detected.

id: exposed-bzr
info:
name: Bazaar Configuration - Detect
author: daffainfo
severity: info
description: Bazaar configuration was detected.
reference:
- http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
max-request: 1
tags: config,exposure
http:
- method: GET
path:
- "{{BaseURL}}/.bzr/branch/branch.conf"
matchers-condition: and
matchers:
- type: word
words:
- "parent_location"
- "push_location"
condition: or
- type: status
status:
- 200
- type: word
part: header
words:
- "text/plain"
# digest: 4b0a004830460221009d07894d760d4c3724330f34640e2a02dee71acc78a841d08f40989659c6b6430221009e927251f9aadfe890c2cf49605e84dacc26588a1b524c7ff9542881fa8f9a39:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/exposed-bzr.yaml"

View on Github