From 0ac5bdb15b594f01ea0461ad4e19be1bbfa70fa5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 30 Nov 2022 13:19:00 +0530 Subject: [PATCH] Create sftp-config.yaml --- exposures/configs/sftp-config.yaml | 32 ++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 exposures/configs/sftp-config.yaml diff --git a/exposures/configs/sftp-config.yaml b/exposures/configs/sftp-config.yaml new file mode 100644 index 0000000000..13274c7352 --- /dev/null +++ b/exposures/configs/sftp-config.yaml @@ -0,0 +1,32 @@ +id: sftp-config + +info: + name: SFTP Config File Disclosure + author: geeknik + severity: high + reference: + - https://blog.sucuri.net/2012/11/psa-sftpftp-password-exposure-via-sftp-config-json.html + - https://www.acunetix.com/vulnerabilities/web/sftp-ftp-credentials-exposure/ + - https://codexns.io/products/sftp_for_sublime/settings + metadata: + verified: true + github-query: filename:sftp-config.json + tags: sftp,config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/sftp-config.json" + + matchers-condition: and + matchers: + - type: word + words: + - '"host":' + - '"user":' + - 'password":' + condition: and + + - type: status + status: + - 200