Scan for Misconfigured Software
Scan for web misconfigurations that can expose sensitive functionality
Category
Vulnerability Scanning
Inputs
urls
file
requiredList of web server URLs
header
string
Header(s) to include in HTTP requests
rate-limit
string
Maximum number of requests to send per second per machine
header-file
file
Header(s) to include in HTTP requests
Outputs
findings
Scan for Misconfigured Software
Description
Scan for web misconfigurations that range from disclosing information and exposing sensitive functionality to enabling complete takeover of an asset
Features
- Scans for a wide range of misconfiguration scenarios.
- Validates the server responses to minimize false positives.
- Can scan thousands of web servers simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.0.1
- Added
Basic Auth
to the list of flagged configurations with a severity level ofinfo
- Added
- v1.1.0
- Added
header-file
input
- Added
- v1.2.0
- Added recursive scanning to detect vulnerabilities at every level of the input URL paths