Skip to content

Exposed Kibana

ID: exposed-kibana

Severity: medium

Author: Shine

Tags: kibana,unauth,misconfig

Kibana is exposed.

id: exposed-kibana
info:
name: Exposed Kibana
author: Shine
severity: medium
description: Kibana is exposed.
metadata:
max-request: 3
tags: kibana,unauth,misconfig
http:
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/app/kibana'
- '{{BaseURL}}/app/kibana/'
matchers-condition: and
matchers:
- type: word
words:
- 'kibanaWelcomeView'
- 'kibanaWelcomeLogo'
- 'kibanaWelcomeTitle'
- type: status
status:
- 200
# digest: 4a0a00473045022100ecd0d2bd3720fe990c7cc14a5be7ebf38326e4958d7371db1eb1da6c0e372c04022030b7a415c0daab03173048f36a5eb2630102ae8366a8dac8fad6b16f92eab78d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/exposed-kibana.yaml"

View on Github