Skip to content

Zipkin Discovery

ID: unauthenticated-zipkin

Severity: high

Author: dhiyaneshDk

Tags: unauth,misconfig

Unauthenticated access to Zipkin was discovered.

id: unauthenticated-zipkin
info:
name: Zipkin Discovery
author: dhiyaneshDk
severity: high
description: Unauthenticated access to Zipkin was discovered.
reference:
- https://zipkin.io/
metadata:
max-request: 1
tags: unauth,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/config.json"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- 'application/json'
part: header
- type: word
words:
- environment
- defaultLookback
part: body
condition: and
# digest: 4b0a00483046022100bba70d64161e5355f02e6b3fe124b5436b5d3c789ab7fb81f366ad2ba32b0b4e022100a805d29c30c63911c5a120bc018eebbace0b5d4bdef986247280d6f0334aec49:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/unauthenticated-zipkin.yaml"

View on Github