Skip to content

AWS bucket with Object listing

ID: aws-object-listing

Severity: low

Author: pdteam

Tags: aws,misconfig,bucket

Object listing is enabled in AWS bucket.

id: aws-object-listing
info:
name: AWS bucket with Object listing
author: pdteam
severity: low
description: Object listing is enabled in AWS bucket.
reference:
- https://mikey96.medium.com/cloud-based-storage-misconfigurations-critical-bounties-361647f78a29
metadata:
max-request: 1
tags: aws,misconfig,bucket
http:
- method: GET
path:
- "{{BaseURL}}"
max-size: 1000
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<ListBucketResult xmlns='
- type: word
part: header
words:
- application/xml
- type: word
part: header
words:
- "x-goog-metageneration"
- "x-goog-generation"
case-insensitive: true
negative: true
extractors:
- type: regex
part: body
group: 1
regex:
- '<Name>([a-z0-9-._]+)'
# digest: 4a0a00473045022100a71b90649ec567adc33aa85dd363003be175e7fe5868e1fd9a50f948bbc13a54022045d7f7618f36f59f8c4cbb702717ff3d33426ba498125b01068d8f010f57390c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aws/aws-object-listing.yaml"

View on Github