Skip to content

Confluence Dashboard Exposed

ID: confluence-dashboard

Severity: low

Author: tess

Tags: misconfig,exposure,confluence,atlassian

Confluence Dashboard is exposed.

id: confluence-dashboard
info:
name: Confluence Dashboard Exposed
author: tess
severity: low
description: Confluence Dashboard is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"Dashboard - Confluence"
tags: misconfig,exposure,confluence,atlassian
http:
- method: GET
path:
- '{{BaseURL}}'
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Dashboard - Confluence'
- 'title="Spaces">'
- 'Atlassian Confluence'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4a0a00473045022100846aa86a7928261f09f88cb1bff6ebf109cd793ab68e1fc01a04f2f15487922b02207fd2379135d7036c197f0288c4d1dc38d697e590d0f6c9253acb932f265d4ddb:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/confluence-dashboard.yaml"

View on Github