Nuclei
What is Nuclei
Nuclei is used to send requests across targets based on a template leading to zero false positives and providing fast scanning on large number of hosts. Nuclei offers scanning for a variety of protocols including TCP, DNS, HTTP, File, etc. With powerful and flexible templating, all kinds of security checks can be modelled with Nuclei.
To learn more about the Nuclei scanner itself visit Nuclei GitHub or Nuclei Website.
Deployment
The nuclei chart can be deployed via helm:
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install nuclei oci://ghcr.io/securecodebox/helm/nuclei
Scanner Configuration
The following security scan configuration example are based on the Nuclei Documentation, please take a look at the original documentation for more configuration examples.
nuclei -h
Nuclei is a fast, template based vulnerability scanner focusing
on extensive configurability, massive extensibility and ease of use.
Usage:
nuclei [flags]
Flags:
TARGET:
-u, -target string[] target URLs/hosts to scan
-l, -list string path to file containing a list of target URLs/hosts to scan (one per line)
TEMPLATES:
-tl list all available templates
-t, -templates string[] template or template directory paths to include in the scan
-w, -workflows string[] list of workflows to run
-nt, -new-templates run newly added templates only
-validate validate the passed templates to nuclei
FILTERING:
-tags string[] execute a subset of templates that contain the provided tags
-include-tags string[] tags from the default deny list that permit executing more intrusive templates
-etags, -exclude-tags string[] exclude templates with the provided tags
-include-templates string[] templates to be executed even if they are excluded either by default or configuration
-exclude-templates, -exclude string[] template or template directory paths to exclude
-severity, -impact string[] execute templates that match the provided severities only
-author string[] execute templates that are (co-)created by the specified authors
OUTPUT:
-o, -output string output file to write found issues/vulnerabilities
-silent display findings only
-v, -verbose show verbose output
-vv display extra verbose information
-nc, -no-color disable output content coloring (ANSI escape codes)
-json write output in JSONL(ines) format
-irr, -include-rr include request/response pairs in the JSONL output (for findings only)
-nm, -no-meta don't display match metadata
-rdb, -report-db string local nuclei reporting database (always use this to persist report data)
-me, -markdown-export string directory to export results in markdown format
-se, -sarif-export string file to export results in SARIF format
CONFIGURATIONS:
-config string path to the nuclei configuration file
-rc, -report-config string nuclei reporting module configuration file
-H, -header string[] custom headers in header:value format
-V, -var value custom vars in var=value format
-r, -resolvers string file containing resolver list for nuclei
-system-resolvers use system DNS resolving as error fallback
-passive enable passive HTTP response processing mode
-env-vars Enable environment variables support
INTERACTSH:
-no-interactsh do not use interactsh server for blind interaction polling
-interactsh-url string self-hosted Interactsh Server URL (default "https://interact.sh")
-interactions-cache-size int number of requests to keep in the interactions cache (default 5000)
-interactions-eviction int number of seconds to wait before evicting requests from cache (default 60)
-interactions-poll-duration int number of seconds to wait before each interaction poll request (default 5)
-interactions-cooldown-period int extra time for interaction polling before exiting (default 5)
RATE-LIMIT:
-rl, -rate-limit int maximum number of requests to send per second (default 150)
-rlm, -rate-limit-minute int maximum number of requests to send per minute
-bs, -bulk-size int maximum number of hosts to be analyzed in parallel per template (default 25)
-c, -concurrency int maximum number of templates to be executed in parallel (default 10)
OPTIMIZATIONS:
-timeout int time to wait in seconds before timeout (default 5)
-retries int number of times to retry a failed request (default 1)
-project use a project folder to avoid sending same request multiple times
-project-path string set a specific project path (default "/var/folders/xq/zxykn5wd0tx796f0xhxf94th0000gp/T/")
-spm, -stop-at-first-path stop processing HTTP requests after the first match (may break template/workflow logic)
HEADLESS:
-headless enable templates that require headless browser support
-page-timeout int seconds to wait for each page in headless mode (default 20)
-show-browser show the browser on the screen when running templates with headless mode
DEBUG:
-debug show all requests and responses
-debug-req show all sent requests
-debug-resp show all received responses
-proxy, -proxy-url string URL of the HTTP proxy server
-proxy-socks-url string URL of the SOCKS proxy server
-trace-log string file to write sent requests trace log
-version show nuclei version
-tv, -templates-version shows the version of the installed nuclei-templates
UPDATE:
-update update nuclei to the latest released version
-ut, -update-templates update the community templates to latest released version
-nut, -no-update-templates Do not check for nuclei-templates updates
-ud, -update-directory string overwrite the default nuclei-templates directory (default "/Users/robert/nuclei-templates")
STATISTICS:
-stats display statistics about the running scan
-stats-json write statistics data to an output file in JSONL(ines) format
-si, -stats-interval int number of seconds to wait between showing a statistics update (default 5)
-metrics expose nuclei metrics on a port
-metrics-port int port to expose nuclei metrics on (default 9092)
Requirements
Kubernetes: >=v1.11.0-0
Install Nuclei without Template Cache CronJob / PersistentVolume
Nuclei uses dynamic templates as its scan rules, these determine which requests are performed and which responses are considered to be a finding.
These templates are usually dynamically downloaded by nuclei from GitHub before each scan. When you are running dozens of parallel nuclei scans you quickly run into situations where GitHub will rate limit you causing the scans to fail.
To avoid these errors we included a CronJob which periodically fetches the current templates and writes them into a kubernetes PersistentVolume (PV). This volume is then mounted (as a ReadOnlyMany
mount) into every scan so that nuclei scans have the up-to-date templates without having to download them on every scan.
Unfortunately not every cluster supports the required ReadOnlyMany
volume type.
In these cases you can disable the template cache mechanism by setting nucleiTemplateCache.enabled=false
.
Note thought, that this will limit the number of scans you can run in parallel as the rate limit will likely cause some of the scans to fail.
helm upgrade --install nuclei oci://ghcr.io/securecodebox/helm/nuclei --set="nucleiTemplateCache.enabled=false"
Values
Key | Type | Default | Description |
---|---|---|---|
cascadingRules.enabled | bool | false | Enables or disables the installation of the default cascading rules for this scanner |
imagePullSecrets | list | [] | Define imagePullSecrets when a private registry is used (see: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) |
nucleiTemplateCache.accessMode | list | ["ReadWriteOnce","ReadOnlyMany"] | Depending on your setup you can define the pvc access mode for one ReadWriteOnce or multiple node clusters ReadWriteMany |
nucleiTemplateCache.concurrencyPolicy | string | "Replace" | Determines how kubernetes handles cases where multiple instances of the cronjob would work if they are running at the same time. See: https://kubernetes.io/docs/tasks/job/automated-tasks-with-cron-jobs/#concurrency-policy |
nucleiTemplateCache.enabled | bool | true | Enables or disables the use of an persistent volume to cache the always downloaded nuclei-templates for all scans. |
nucleiTemplateCache.failedJobsHistoryLimit | int | 10 | Determines how many failed jobs are kept until kubernetes cleans them up. See: https://kubernetes.io/docs/tasks/job/automated-tasks-with-cron-jobs/#jobs-history-limits |
nucleiTemplateCache.schedule | string | "0 */1 * * *" | The schedule indicates when and how often the nuclei template cache should be updated |
nucleiTemplateCache.successfulJobsHistoryLimit | int | 3 | Determines how many successful jobs are kept until kubernetes cleans them up. See: https://kubernetes.io/docs/tasks/job/automated-tasks-with-cron-jobs/#jobs-history-limits |
parser.affinity | object | {} | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
parser.env | list | [] | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
parser.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
parser.image.repository | string | "docker.io/securecodebox/parser-nuclei" | Parser image repository |
parser.image.tag | string | defaults to the charts version | Parser image tag |
parser.nodeSelector | object | {} | Optional nodeSelector settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/) |
parser.resources | object | { requests: { cpu: "200m", memory: "100Mi" }, limits: { cpu: "400m", memory: "200Mi" } } | Optional resources lets you control resource limits and requests for the parser container. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ |
parser.scopeLimiterAliases | object | {} | Optional finding aliases to be used in the scopeLimiter. |
parser.tolerations | list | [] | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
parser.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
scanner.activeDeadlineSeconds | string | nil | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
scanner.affinity | object | {} | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
scanner.env | list | [] | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
scanner.extraContainers | list | [] | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
scanner.extraVolumeMounts | list | [] | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.extraVolumes | list | [] | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
scanner.image.repository | string | "docker.io/projectdiscovery/nuclei" | Container Image to run the scan |
scanner.image.tag | string | nil | defaults to the charts appVersion |
scanner.nameAppend | string | nil | append a string to the default scantype name. |
scanner.nodeSelector | object | {} | Optional nodeSelector settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/) |
scanner.podSecurityContext | object | {} | Optional securityContext set on scanner pod (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.resources | object | {} | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
scanner.securityContext | object | {"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":false,"runAsNonRoot":false} | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.securityContext.allowPrivilegeEscalation | bool | false | Ensure that users privileges cannot be escalated |
scanner.securityContext.capabilities.drop[0] | string | "all" | This drops all linux privileges from the container. |
scanner.securityContext.privileged | bool | false | Ensures that the scanner container is not run in privileged mode |
scanner.securityContext.readOnlyRootFilesystem | bool | false | Prevents write access to the containers file system |
scanner.securityContext.runAsNonRoot | bool | false | Enforces that the scanner image is run as a non root user |
scanner.suspend | bool | false | if set to true the scan job will be suspended after creation. You can then resume the job using kubectl resume <jobname> or using a job scheduler like kueue |
scanner.tolerations | list | [] | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
scanner.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
License
Code of secureCodeBox is licensed under the Apache License 2.0.
CPU architectures
The scanner is currently supported for these CPU architectures:
- linux/amd64
- linux/arm64
Examples
bodgeit
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nuclei-bodgeit-scan"
spec:
scanType: "nuclei"
parameters:
- "-no-interactsh"
- "-v"
- "-debug"
- "-target"
- "http://bodgeit.demo-targets.svc.cluster.local:8080"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "Tomcat exposed docs",
"description": "The name of the nuclei rule which triggered the finding: tomcat-exposed-docs",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "tomcat-exposed-docs",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["version", "tomcat", "docs"],
"reference": null,
"author": ["podalirius"],
"metadata": {"shodan-query": 'title:"Apache Tomcat"'},
"timestamp": "2022-10-27T13:54:59.4860876Z",
"matcher_status": true,
"matcher_name": "word-1",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/docs/",
"matched_line": null,
"extracted_results": ["Version 8.5.28,"],
"template_id": "tomcat-exposed-docs",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/docs/'",
},
"id": "637855f7-2ed8-461a-8a17-d7bd13b180cd",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "Tomcat exposed docs",
"description": "The name of the nuclei rule which triggered the finding: tomcat-exposed-docs",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "tomcat-exposed-docs",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["version", "tomcat", "docs"],
"reference": null,
"author": ["podalirius"],
"metadata": {"shodan-query": 'title:"Apache Tomcat"'},
"timestamp": "2022-10-27T13:54:59.4868304Z",
"matcher_status": true,
"matcher_name": "status-2",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/docs/",
"matched_line": null,
"extracted_results": ["Version 8.5.28,"],
"template_id": "tomcat-exposed-docs",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/docs/'",
},
"id": "941c4e23-09af-47d5-9fce-1e8c3d03ec4f",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.378229Z",
"matcher_status": true,
"matcher_name": "x-permitted-cross-domain-policies",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "dd4b218f-6f4a-43fe-8a85-8dc12b5cb8dd",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.378293Z",
"matcher_status": true,
"matcher_name": "cross-origin-embedder-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "db64bc3c-56b5-4a7e-9fb3-c3ac7b6b9a67",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.378309Z",
"matcher_status": true,
"matcher_name": "cross-origin-resource-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "0670fe8e-49a1-4c40-87c8-a4ae115511d1",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783303Z",
"matcher_status": true,
"matcher_name": "x-frame-options",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "66a3ea60-4fea-41b6-8271-2d2268f33110",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783413Z",
"matcher_status": true,
"matcher_name": "access-control-max-age",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "9a5e225a-2f8e-4bca-b750-36377753aeb3",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783523Z",
"matcher_status": true,
"matcher_name": "access-control-allow-headers",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "a6a0e86e-eff5-4f98-9097-b3ec990a6398",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783622Z",
"matcher_status": true,
"matcher_name": "cross-origin-opener-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "5ab5bdad-6ffd-4a99-9ad1-677e82bdb49d",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783721Z",
"matcher_status": true,
"matcher_name": "referrer-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "36a3a3a6-4ec5-4b36-b475-62c0f45d2f37",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3783848Z",
"matcher_status": true,
"matcher_name": "clear-site-data",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "da515b61-b663-4379-a33b-97eb0178e64c",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.378396Z",
"matcher_status": true,
"matcher_name": "access-control-allow-credentials",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "6fee0217-b6a0-46ee-bb54-8b183a265f29",
"parsed_at": "2022-10-27T13:56:06.629Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784059Z",
"matcher_status": true,
"matcher_name": "access-control-expose-headers",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "f68a8766-84c4-4994-a713-f1961913fdad",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784156Z",
"matcher_status": true,
"matcher_name": "access-control-allow-methods",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "297c6bcf-09f8-493a-ae4b-55cdc86e92f1",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784275Z",
"matcher_status": true,
"matcher_name": "strict-transport-security",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "1302b6e3-eebe-4c8e-b4bf-be32d777cf1e",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784379Z",
"matcher_status": true,
"matcher_name": "permissions-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "5cb55011-cc1f-4dff-a906-a3b49437e15c",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784474Z",
"matcher_status": true,
"matcher_name": "x-content-type-options",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "60120221-932b-49fe-974f-58aa936e969e",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3784568Z",
"matcher_status": true,
"matcher_name": "access-control-allow-origin",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "65e1511a-cdbf-4eca-85f2-4fac1c51b5bf",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["misconfig", "generic"],
"reference": null,
"author":
[
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass",
],
"metadata": null,
"timestamp": "2022-10-27T13:55:01.3785289Z",
"matcher_status": true,
"matcher_name": "content-security-policy",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": null,
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "8dbfc6ea-f4d6-4726-bdfc-8f277d7592a5",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "Detect Tomcat Exposed Scripts",
"description": "The name of the nuclei rule which triggered the finding: tomcat-scripts",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "tomcat-scripts",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["apache", "tomcat"],
"reference": null,
"author": ["co0nan"],
"metadata": null,
"timestamp": "2022-10-27T13:55:09.7199733Z",
"matcher_status": true,
"matcher_name": "word-1",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/examples/jsp/index.html",
"matched_line": null,
"extracted_results": null,
"template_id": "tomcat-scripts",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/examples/jsp/index.html'",
},
"id": "eaafd41c-635d-4485-980d-0db20fb64e4e",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "Detect Tomcat Exposed Scripts",
"description": "The name of the nuclei rule which triggered the finding: tomcat-scripts",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "tomcat-scripts",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["apache", "tomcat"],
"reference": null,
"author": ["co0nan"],
"metadata": null,
"timestamp": "2022-10-27T13:55:09.7694196Z",
"matcher_status": true,
"matcher_name": "word-1",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/examples/websocket/index.xhtml",
"matched_line": null,
"extracted_results": null,
"template_id": "tomcat-scripts",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/examples/websocket/index.xhtml'",
},
"id": "d6dd4a0d-ee2d-4838-82a0-a8b5cf4d2f99",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "Tomcat Detection",
"description": "If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version.",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "tomcat-detect",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["tech", "tomcat", "apache"],
"reference": null,
"author": ["philippedelteil", "dhiyaneshdk"],
"metadata": {"shodan-query": 'title:"Apache Tomcat"'},
"timestamp": "2022-10-27T13:55:20.4066623Z",
"matcher_status": true,
"matcher_name": "dsl-2",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"matched_line": null,
"extracted_results": ["8.5.28"],
"template_id": "tomcat-detect",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080'",
},
"id": "657bb944-16cb-4758-aa0e-b4a7b23cf203",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "WAF Detection",
"description": "A web application firewall was detected.",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "waf-detect",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["waf", "tech", "misc"],
"reference": ["https://github.com/ekultek/whatwaf"],
"author": ["dwisiswant0", "lu4nx"],
"metadata": null,
"timestamp": "2022-10-27T13:55:27.598078Z",
"matcher_status": true,
"matcher_name": "ats",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/",
"matched_line": null,
"extracted_results": null,
"template_id": "waf-detect",
"request": null,
"response": null,
"curl_command": "curl -X 'POST' -d '_=<script>alert(1)</script>' -H 'Content-Type: application/x-www-form-urlencoded' -H 'Host: bodgeit.demo-targets.svc.cluster.local:8080' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.47 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/'",
},
"id": "b5dc79cc-821d-44db-927c-6a1e04e65b01",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "WAF Detection",
"description": "A web application firewall was detected.",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "waf-detect",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["waf", "tech", "misc"],
"reference": ["https://github.com/ekultek/whatwaf"],
"author": ["dwisiswant0", "lu4nx"],
"metadata": null,
"timestamp": "2022-10-27T13:55:27.5981729Z",
"matcher_status": true,
"matcher_name": "apachegeneric",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/",
"matched_line": null,
"extracted_results": null,
"template_id": "waf-detect",
"request": null,
"response": null,
"curl_command": "curl -X 'POST' -d '_=<script>alert(1)</script>' -H 'Content-Type: application/x-www-form-urlencoded' -H 'Host: bodgeit.demo-targets.svc.cluster.local:8080' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.47 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/'",
},
"id": "963b131e-db97-4a77-9cae-0bde147a8f78",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
{
"name": "favicon-detection",
"description": "The name of the nuclei rule which triggered the finding: favicon-detection",
"location": "http://bodgeit.demo-targets.svc.cluster.local:8080",
"severity": "INFORMATIONAL",
"category": "favicon-detection",
"attributes":
{
"ip": "10.96.163.66",
"type": "http",
"hostname": "bodgeit.demo-targets.svc.cluster.local",
"path": null,
"tags": ["tech", "favicon"],
"reference":
[
"https://twitter.com/brsn76945860/status/1171233054951501824",
"https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a",
"https://medium.com/@asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139",
"https://github.com/devanshbatham/favfreak",
"https://github.com/sansatart/scrapts/blob/master/shodan-favicon-hashes.csv",
],
"author": ["un-fmunozs"],
"metadata": null,
"timestamp": "2022-10-27T13:55:36.0046322Z",
"matcher_status": true,
"matcher_name": "apache-tomcat",
"matched_at": "http://bodgeit.demo-targets.svc.cluster.local:8080/favicon.ico",
"matched_line": null,
"extracted_results": null,
"template_id": "favicon-detection",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2309.372 Safari/537.36' 'http://bodgeit.demo-targets.svc.cluster.local:8080/favicon.ico'",
},
"id": "a3e72f63-3535-4104-88fb-728971ff4cd9",
"parsed_at": "2022-10-27T13:56:06.630Z",
},
]
example.com
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nuclei-example-scan"
spec:
scanType: "nuclei"
parameters:
# Target domain name of the finding and start a nuclei scan
- "-u"
- "https://example.com"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.271592+02:00",
"matcher_status": true,
"matcher_name": "content-security-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.272231+02:00",
"matcher_status": true,
"matcher_name": "x-permitted-cross-domain-policies",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.272358+02:00",
"matcher_status": true,
"matcher_name": "clear-site-data",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.27242+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-credentials",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.272488+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-headers",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.272559+02:00",
"matcher_status": true,
"matcher_name": "permission-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.292757+02:00",
"matcher_status": true,
"matcher_name": "cross-origin-embedder-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293626+02:00",
"matcher_status": true,
"matcher_name": "cross-origin-resource-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293711+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-origin",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293768+02:00",
"matcher_status": true,
"matcher_name": "access-control-expose-headers",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293798+02:00",
"matcher_status": true,
"matcher_name": "access-control-max-age",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293859+02:00",
"matcher_status": true,
"matcher_name": "strict-transport-security",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293899+02:00",
"matcher_status": true,
"matcher_name": "x-frame-options",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293924+02:00",
"matcher_status": true,
"matcher_name": "x-content-type-options",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293951+02:00",
"matcher_status": true,
"matcher_name": "referrer-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.293979+02:00",
"matcher_status": true,
"matcher_name": "cross-origin-opener-policy",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.294616+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-methods",
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36' 'https://example.com'"
}
},
{
"name": "SSL DNS Names",
"description": "The name of the nuclei rule which triggered the finding: ssl-dns-names",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "ssl-dns-names",
"attributes": {
"ip": "93.184.216.34",
"type": "ssl",
"hostname": "example.com",
"path": null,
"tags": [
"ssl"
],
"reference": null,
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:18:55.401569+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"example.net",
"example.edu",
"example.com",
"example.org",
"www.example.com",
"www.example.edu",
"www.example.net",
"www.example.org"
],
"template": "ssl/ssl-dns-names.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/ssl/ssl-dns-names.yaml",
"template_id": "ssl-dns-names",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "Allowed Options Method",
"description": "The name of the nuclei rule which triggered the finding: options-method",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "options-method",
"attributes": {
"ip": "93.184.216.34",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"misc",
"generic"
],
"reference": null,
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:19:38.295229+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"OPTIONS, GET, HEAD, POST"
],
"template": "miscellaneous/options-method.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/miscellaneous/options-method.yaml",
"template_id": "options-method",
"request": null,
"response": null,
"curl_command": "curl -X 'OPTIONS' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36' 'https://example.com'"
}
},
{
"name": "Deprecated TLS Detection (TLS 1.1 or SSLv3)",
"description": "Both TLS 1.1 and SSLv3 are deprecated in favor of stronger encryption.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "deprecated-tls",
"attributes": {
"ip": "93.184.216.34",
"type": "ssl",
"hostname": "example.com",
"path": null,
"tags": [
"ssl"
],
"reference": [
"https://ssl-config.mozilla.org/#config=intermediate"
],
"author": [
"righettod",
"forgedhallpass"
],
"metadata": {
"shodan-query": "ssl.version:sslv2 ssl.version:sslv3 ssl.version:tlsv1 ssl.version:tlsv1.1"
},
"timestamp": "2022-09-09T21:20:23.43205+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"TLS10"
],
"template": "ssl/deprecated-tls.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/ssl/deprecated-tls.yaml",
"template_id": "deprecated-tls",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "Deprecated TLS Detection (TLS 1.1 or SSLv3)",
"description": "Both TLS 1.1 and SSLv3 are deprecated in favor of stronger encryption.\n",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "deprecated-tls",
"attributes": {
"ip": "93.184.216.34",
"type": "ssl",
"hostname": "example.com",
"path": null,
"tags": [
"ssl"
],
"reference": [
"https://ssl-config.mozilla.org/#config=intermediate"
],
"author": [
"righettod",
"forgedhallpass"
],
"metadata": {
"shodan-query": "ssl.version:sslv2 ssl.version:sslv3 ssl.version:tlsv1 ssl.version:tlsv1.1"
},
"timestamp": "2022-09-09T21:20:23.731779+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"TLS11"
],
"template": "ssl/deprecated-tls.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/ssl/deprecated-tls.yaml",
"template_id": "deprecated-tls",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "NS Record Detection",
"description": "An NS record was detected. An NS record delegates a subdomain to a set of name servers.",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "nameserver-fingerprint",
"attributes": {
"ip": null,
"type": "dns",
"hostname": "example.com",
"path": null,
"tags": [
"dns",
"ns"
],
"reference": null,
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:20:29.548052+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"a.iana-servers.net.",
"b.iana-servers.net."
],
"template": "dns/nameserver-fingerprint.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/dns/nameserver-fingerprint.yaml",
"template_id": "nameserver-fingerprint",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "DNSSEC Detection",
"description": "Domain Name System Security Extensions (DNSSEC) are enabled. The Delegation of Signing (DS) record provides information about a signed zone file when DNSSEC enabled.",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "dnssec-detection",
"attributes": {
"ip": null,
"type": "dns",
"hostname": "example.com",
"path": null,
"tags": [
"dns",
"dnssec"
],
"reference": [
"https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en",
"https://www.cyberciti.biz/faq/unix-linux-test-and-validate-dnssec-using-dig-command-line/"
],
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:20:38.059221+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"31406 8 1 189968811E6EBA862DD6C209F75623D8D9ED9142",
"31406 8 2 F78CF3344F72137235098ECBBD08947C2C9001C7F6A085A17F518B5D8F6B916D",
"31589 8 1 3490A6806D47F17A34C29E2CE80E8A999FFBE4BE",
"31589 8 2 CDE0D742D6998AA554A92D890F8184C698CFAC8A26FA59875A990C03E576343C",
"43547 8 1 B6225AB2CC613E0DCA7962BDC2342EA4F1B56083",
"43547 8 2 615A64233543F66F44D68933625B17497C89A70E858ED76A2145997EDF96A918"
],
"template": "dns/dnssec-detection.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/dns/dnssec-detection.yaml",
"template_id": "dnssec-detection",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "DNS TXT Record Detected",
"description": "A DNS TXT record was detected. The TXT record lets a domain admin leave notes on a DNS server.",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "txt-fingerprint",
"attributes": {
"ip": null,
"type": "dns",
"hostname": "example.com",
"path": null,
"tags": [
"dns",
"txt"
],
"reference": [
"https://www.netspi.com/blog/technical/network-penetration-testing/analyzing-dns-txt-records-to-fingerprint-service-providers/"
],
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:20:45.095908+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"\"v=spf1 -all\"",
"\"wgyf8z8cgvm2qmxpnbnldrcltvk4xqfn\""
],
"template": "dns/txt-fingerprint.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/dns/txt-fingerprint.yaml",
"template_id": "txt-fingerprint",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "MX Record Detection",
"description": "An MX record was detected. MX records direct emails to a mail exchange server.",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "mx-fingerprint",
"attributes": {
"ip": null,
"type": "dns",
"hostname": "example.com",
"path": null,
"tags": [
"dns",
"mx"
],
"reference": [
"https://www.cloudflare.com/learning/dns/dns-records/dns-mx-record/",
"https://mxtoolbox.com/"
],
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:20:54.419479+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"0 ."
],
"template": "dns/mx-fingerprint.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/dns/mx-fingerprint.yaml",
"template_id": "mx-fingerprint",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "TLS Version",
"description": "The name of the nuclei rule which triggered the finding: tls-version",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "tls-version",
"attributes": {
"ip": "93.184.216.34",
"type": "ssl",
"hostname": "example.com",
"path": null,
"tags": [
"ssl"
],
"reference": null,
"author": [
"pdteam"
],
"metadata": null,
"timestamp": "2022-09-09T21:21:04.604798+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://example.com",
"matched_line": null,
"extracted_results": [
"TLS13"
],
"template": "ssl/tls-version.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/ssl/tls-version.yaml",
"template_id": "tls-version",
"request": null,
"response": null,
"curl_command": null
}
},
{
"name": "Microsoft Azure - Domain Tenant ID",
"description": "Checks if the domain is part of an Azure tenant and finds the ID using Azure's OpenID discovery page.",
"location": "https://example.com",
"severity": "INFORMATIONAL",
"category": "azure-domain-tenant",
"attributes": {
"ip": "40.126.32.140",
"type": "http",
"hostname": "example.com",
"path": null,
"tags": [
"azure",
"microsoft",
"cloud"
],
"reference": null,
"author": [
"v0idc0de"
],
"metadata": null,
"timestamp": "2022-09-09T21:21:17.696098+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://login.microsoftonline.com:443/example.com/v2.0/.well-known/openid-configuration",
"matched_line": null,
"extracted_results": [
"c7c08208-4f4d-45f1-83cd-5e2f491ab786"
],
"template": "exposures/configs/azure-domain-tenant.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/exposures/configs/azure-domain-tenant.yaml",
"template_id": "azure-domain-tenant",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Host: login.microsoftonline.com' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36' 'https://login.microsoftonline.com:443/example.com/v2.0/.well-known/openid-configuration'"
}
}
]
secureCodeBox.io
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nuclei-securecodebox-scan"
spec:
scanType: "nuclei"
parameters:
# Target domain name of the finding and start a nuclei scan
- "-u"
- "https://www.secureCodeBox.io"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "DOM EventListener detection",
"description": "The name of the nuclei rule which triggered the finding: addeventlistener-detect",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "addeventlistener-detect",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"xss",
"misc"
],
"reference": [
"https://portswigger.net/web-security/dom-based/controlling-the-web-message-source"
],
"author": [
"yavolo",
"dwisiswant0"
],
"metadata": null,
"timestamp": "2022-09-09T21:26:27.762236+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "miscellaneous/addeventlistener-detect.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/miscellaneous/addeventlistener-detect.yaml",
"template_id": "addeventlistener-detect",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "Email Extractor",
"description": "The name of the nuclei rule which triggered the finding: email-extractor",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "email-extractor",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misc",
"email"
],
"reference": null,
"author": [
"panch0r3d"
],
"metadata": null,
"timestamp": "2022-09-09T21:26:27.777226+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": [
"securecodebox@iteratec.com"
],
"template": "miscellaneous/email-extractor.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/miscellaneous/email-extractor.yaml",
"template_id": "email-extractor",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "Metatag CMS Detection",
"description": "Generic CMS Detection using html meta generator tag",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "metatag-cms",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"tech",
"cms"
],
"reference": [
"https://www.w3schools.com/tags/att_meta_name.asp"
],
"author": [
"dadevel"
],
"metadata": null,
"timestamp": "2022-09-09T21:26:28.511351+02:00",
"matcher_status": true,
"matcher_name": null,
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": [
"Docusaurus v2.0.1"
],
"template": "technologies/metatag-cms.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/technologies/metatag-cms.yaml",
"template_id": "metatag-cms",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/44.0.2403.155 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.644349+02:00",
"matcher_status": true,
"matcher_name": "referrer-policy",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.644671+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-origin",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.644884+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-credentials",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.644952+02:00",
"matcher_status": true,
"matcher_name": "access-control-expose-headers",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.645129+02:00",
"matcher_status": true,
"matcher_name": "access-control-allow-methods",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.645183+02:00",
"matcher_status": true,
"matcher_name": "x-content-type-options",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappsec",
"kurohost",
"dawid-czarnecki",
"forgedhallpass"
],
"metadata": null,
"timestamp": "2022-09-09T21:27:13.655101+02:00",
"matcher_status": true,
"matcher_name": "x-permitted-cross-domain-policies",
"matched_at": "https://www.securecodebox.io",
"matched_line": null,
"extracted_results": null,
"template": "misconfiguration/http-missing-security-headers.yaml",
"template_url": "https://github.com/projectdiscovery/nuclei-templates/blob/master/misconfiguration/http-missing-security-headers.yaml",
"template_id": "http-missing-security-headers",
"request": null,
"response": null,
"curl_command": "curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36' 'https://www.securecodebox.io'"
}
},
{
"name": "HTTP Missing Security Headers",
"description": "This template searches for missing HTTP security headers. The impact of these missing headers can vary.\n",
"location": "https://www.securecodebox.io",
"severity": "INFORMATIONAL",
"category": "http-missing-security-headers",
"attributes": {
"ip": "34.159.58.69",
"type": "http",
"hostname": "www.securecodebox.io",
"path": null,
"tags": [
"misconfig",
"generic"
],
"reference": null,
"author": [
"socketz",
"geeknik",
"g4l1t0",
"convisoappse