Skip to content

etcd Unauthenticated HTTP API Leak

ID: http-etcd-unauthenticated-api-data-leak

Severity: high

Author: dhiyaneshDk

Tags: misconfig,hackerone,unauth,etcd

etcd HTTP API is exposed.

id: http-etcd-unauthenticated-api-data-leak
info:
name: etcd Unauthenticated HTTP API Leak
author: dhiyaneshDk
severity: high
description: etcd HTTP API is exposed.
reference:
- https://hackerone.com/reports/1088429
metadata:
max-request: 1
tags: misconfig,hackerone,unauth,etcd
http:
- method: GET
path:
- "{{BaseURL}}/v2/auth/roles"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"roles"'
- '"permissions"'
- '"role"'
- '"kv"'
condition: and
- type: word
part: header
words:
- "text/plain"
- "application/json"
condition: or
- type: status
status:
- 200
# digest: 4a0a0047304502205c6dd4e040362e3caf790ecbb519f29b1f386cbe1ddce58c0641208846715d96022100e53899d8a006ddc74541f9cb90bc6104cfbe2c38a5a41de488fbe579d046992f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/etcd-unauthenticated-api.yaml"

View on Github