nuclei-templates/http/exposures/configs/sphinxsearch-config.yaml

42 lines
1.2 KiB
YAML
Raw Normal View History

id: sphinxsearch-config
info:
2024-02-27 18:00:29 +00:00
name: Sphinx Search Config - Exposure
author: gtrrnr
severity: high
description: sphinx.conf file contains SQL credentials and is publicly accessible.
impact: |
An attacker can use leaked credentials to gain access to database.
reference:
- https://github.com/manticorp/SphinxSearch/blob/master/sphinx.conf.example
metadata:
2024-02-27 18:00:29 +00:00
verified: true
max-request: 7
2024-02-27 18:00:29 +00:00
tags: sphinx,sphinxsearch,exposure,config
http:
- method: GET
path:
- "{{BaseURL}}/config/development.sphinx.conf"
- "{{BaseURL}}/config/production.sphinx.conf"
- "{{BaseURL}}/configs/sphinx.conf"
- "{{BaseURL}}/search/configs/sphinx.conf"
- "{{BaseURL}}/sphinx.conf"
- "{{BaseURL}}/sphinx/sphinx.conf"
- "{{BaseURL}}/sphinxsearch/sphinx.conf"
2024-02-27 18:00:29 +00:00
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "sql_user"
2024-02-27 18:00:29 +00:00
- "sql_pass"
- "indexer"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100abd19b2bc181c6d51189231ccfcda8b95cf2a120a50d095cc622da6df3efb399022100c5e310e6189dc137f15d8741736a9e57b3b44b8f0b80e9990872ffa7419883cb:922c64590222798bb761d5b6d8e72950