nuclei-templates/http/exposures/configs/phpinfo-files.yaml

69 lines
1.8 KiB
YAML
Raw Normal View History

2020-04-04 18:19:48 +00:00
id: phpinfo-files
info:
name: PHPinfo Page - Detect
2023-12-31 16:09:36 +00:00
author: pdteam,daffainfo,meme-lord,dhiyaneshDK,wabafet,mastercho
2023-03-17 16:49:35 +00:00
severity: low
description: |
PHPinfo page was detected. The output of the phpinfo() command can reveal sensitive and detailed PHP environment information.
2023-03-17 16:49:35 +00:00
remediation: Remove PHP Info pages from publicly accessible sites, or restrict access to authorized users only.
2023-03-02 20:58:29 +00:00
classification:
cwe-id: CWE-200
metadata:
max-request: 25
tags: config,exposure,phpinfo
2020-04-04 18:19:48 +00:00
http:
2020-04-04 18:19:48 +00:00
- method: GET
2020-05-25 08:02:27 +00:00
path:
- "{{BaseURL}}{{paths}}"
payloads:
paths:
- "/php.php"
- "/php2.php"
- "/phpinfo.php"
- "/info.php"
- "/infophp.php"
- "/php_info.php"
- "/test.php"
- "/i.php"
- "/p.php"
- "/pi.php"
- "/asdf.php"
- "/pinfo.php"
- "/phpversion.php"
- "/time.php"
- "/index.php"
- "/temp.php"
- "/old_phpinfo.php"
- "/infos.php"
- "/linusadmin-phpinfo.php"
- "/php-info.php"
- "/dashboard/phpinfo.php"
- "/_profiler/phpinfo.php"
- "/_profiler/phpinfo"
- "/?phpinfo=1"
- "/l.php?act=phpinfo"
2021-09-17 07:50:06 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
matchers-condition: and
2020-04-04 18:19:48 +00:00
matchers:
- type: word
part: body
2020-05-25 08:02:27 +00:00
words:
2020-04-04 18:19:48 +00:00
- "PHP Extension"
- "PHP Version"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
2021-09-17 07:50:06 +00:00
- '>PHP Version <\/td><td class="v">([0-9.]+)'
# digest: 4a0a0047304502210099232841cdc5c231ae3d676d8a93bdf005460495483757f8fc3716bc033b481a02202dacf40e940a66680b41af4802eb37a6e470d949904241b26612ba281013e422:922c64590222798bb761d5b6d8e72950