Skip to content

Deployment Management Interface - Exposed

ID: deployment-interface-exposed

Severity: medium

Author: DhiyaneshDK

Tags: deployment,management,misconfig

Deployment Management Interface is exposed. This exposure could potentially allow unauthorized access to the management interface

id: deployment-interface-exposed
info:
name: Deployment Management Interface - Exposed
author: DhiyaneshDK
severity: medium
description: |
Deployment Management Interface is exposed. This exposure could potentially allow unauthorized access to the management interface
metadata:
verified: true
max-request: 1
tags: deployment,management,misconfig
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<title>Deployment Management Interface</title>"
- type: status
status:
- 200
# digest: 4a0a00473045022100c8467b1deb2513090f1a577c0e0a7df8dfd4c31f51bbd2d220d63cb44fa5697f0220456102189ca456383dcb3d96bb2efe0fc0e8249fb1717c248a6ea4ae373b52dc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/deployment-interface-exposed.yaml"

View on Github