nuclei-templates/http/exposures/files/appsettings-file-disclosure...

40 lines
1014 B
YAML
Raw Normal View History

id: appsettings-file-disclosure
info:
name: Application Setting file disclosure
author: DhiyaneshDK,tess
severity: high
description: |
appsetting.json file discloses the DB connection strings containing sensitive information.
reference:
- https://twitter.com/hacker_/status/1518003548855930882?s=20&t=BVauK0yUjVl5yL7rwy0Eag
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 2
2022-10-13 10:12:07 +00:00
tags: exposure,files
http:
- method: GET
path:
- "{{BaseURL}}/appsettings.json"
- "{{BaseURL}}/appsettings.Production.json"
2023-01-05 16:23:37 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "ConnectionStrings"
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502200ab0a99b7f2a8e0bd193d05bfb9729dd541336eed01eb74041387c3d11c5cd1b022100ceeb9d3c0ca44313f67af0375112f915400c298b3b4e1942f3cce2fef6954809:922c64590222798bb761d5b6d8e72950