Skip to content

Keycloak JSON File

ID: keycloak-json

Severity: info

Author: oppsec

Tags: exposure,keycloak,config,files

id: keycloak-json
info:
name: Keycloak JSON File
author: oppsec
severity: info
metadata:
max-request: 1
tags: exposure,keycloak,config,files
http:
- method: GET
path:
- "{{BaseURL}}/keycloak.json"
matchers-condition: and
matchers:
- type: word
words:
- realm
- resource
- auth-server-url
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100e62bc17d1690e44e8122d10bd81019b0edfde49d62076d5477ab7135fb984487022100c9b08c9fce8ed11e753305fc5fedc1ab4837222ecd345e95afb2cbab29fed0d2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/keycloak-json.yaml"

View on Github