Skip to content

Pa11y Dashboard Exposure

ID: pa11y-dashboard

Severity: low

Author: tess

Tags: misconfig,exposure,pa11y

Pa11y Dashboard is exposed.

id: pa11y-dashboard
info:
name: Pa11y Dashboard Exposure
author: tess
severity: low
description: Pa11y Dashboard is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"Pa11y Dashboard"
tags: misconfig,exposure,pa11y
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Pa11y Dashboard"
- "Add new URL"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100a2674ece9e0d914d345ab0f6b55e78893049a8d48dfa5c5ef07806bcbf599b2402200c0bc6d43bc92da52123744dc15d70524ef9ce57da66bfd01ee603678f6c8a3d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/pa11y-dashboard.yaml"

View on Github