Skip to content

Cloud Config File Exposure

ID: cloud-config

Severity: medium

Author: DhiyaneshDK,Hardik-Solanki

Tags: exposure,cloud,devops,files

Cloud Config file is exposed.

id: cloud-config
info:
name: Cloud Config File Exposure
author: DhiyaneshDK,Hardik-Solanki
severity: medium
description: Cloud Config file is exposed.
reference: https://www.exploit-db.com/ghdb/7959
metadata:
verified: true
max-request: 3
shodan-query: html:"cloud-config.yml"
tags: exposure,cloud,devops,files
http:
- method: GET
path:
- "{{BaseURL}}/cloud-config.yml"
- "{{BaseURL}}/core-cloud-config.yml"
- '{{BaseURL}}/cloud-config.txt'
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- 'ssh_authorized_keys'
- '#cloud-config'
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502204b0c198a6690a10a5ed33df4c2e28cecc7ecf10933cf2ea03dff24929cb42da5022100bb99f15c50060c1d59c11d6ac4676396c9844ee9fbbb2bbb5889f56406080fea:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/cloud-config.yaml"

View on Github