Skip to content

Detect Kubernetes Exposed Metrics

ID: kubernetes-metrics

Severity: low

Author: pussycat0x

Tags: kubernetes,exposure,devops,misconfig

Information Disclosure of Garbage Collection

id: kubernetes-metrics
info:
name: Detect Kubernetes Exposed Metrics
author: pussycat0x
severity: low
description: Information Disclosure of Garbage Collection
reference:
- https://kubernetes.io/docs/concepts/cluster-administration/system-metrics/#metrics-in-kubernetes
metadata:
max-request: 1
tags: kubernetes,exposure,devops,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/metrics"
matchers-condition: and
matchers:
- type: word
part: body
condition: and
words:
- "namespace"
- "HELP"
- "TYPE"
- "kube"
- type: status
status:
- 200
# digest: 4a0a004730450221009a01f4fb5516490959202843b7108590bcc7ee1cd893732ee0738f257079a781022036b989c8cdab09cc17d885e61785d4e0049dd51a366fafd6b9fdb6e517dc6f9f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/kubernetes/kubernetes-metrics.yaml"

View on Github