2020-07-24 07:13:24 +00:00
|
|
|
id: web-config
|
2022-04-22 10:38:41 +00:00
|
|
|
|
2020-07-24 07:13:24 +00:00
|
|
|
info:
|
2023-02-24 19:00:45 +00:00
|
|
|
name: Web Configuration File - Detect
|
2022-08-31 16:38:19 +00:00
|
|
|
author: Yash Anand @yashanand155,DhiyaneshDK
|
2020-07-24 10:02:27 +00:00
|
|
|
severity: info
|
2023-02-24 18:48:47 +00:00
|
|
|
description: Web configuration file was detected.
|
2023-02-24 19:00:45 +00:00
|
|
|
reference:
|
|
|
|
- https://github.com/imhunterand/ApachSAL/blob/main/assets/exploits.json
|
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
2023-10-14 11:27:55 +00:00
|
|
|
cvss-score: 0
|
2023-02-24 19:00:45 +00:00
|
|
|
cwe-id: CWE-200
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 2
|
2023-10-14 11:27:55 +00:00
|
|
|
tags: config,exposure
|
2020-07-24 10:02:27 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2020-07-24 07:13:24 +00:00
|
|
|
- method: GET
|
|
|
|
path:
|
|
|
|
- '{{BaseURL}}/web.config'
|
2022-08-31 16:06:39 +00:00
|
|
|
- '{{BaseURL}}/../../web.config'
|
2020-07-24 10:02:27 +00:00
|
|
|
|
|
|
|
matchers-condition: and
|
2020-07-24 07:13:24 +00:00
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- <configuration>
|
2020-07-24 10:02:27 +00:00
|
|
|
- <system.webServer>
|
|
|
|
condition: and
|
|
|
|
|
|
|
|
- type: status
|
|
|
|
status:
|
2022-08-31 16:06:39 +00:00
|
|
|
- 200
|
2023-10-19 13:13:52 +00:00
|
|
|
# digest: 490a00463044022062cb4369acebf629ecb0a6bf788d7088c3237f06385b1f56a8c74ca8ad6d2d4802204afaa05d20bc9a4c5c3e211dfbe988e6c33681fd658aa9e00544e8c7c4019e9f:922c64590222798bb761d5b6d8e72950
|