From 5266e5807a30e9cfdfa51e261b5aa534b1e02473 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 4 Jun 2022 20:40:24 +0100 Subject: [PATCH] Create appsettings-file-disclosure.yaml --- .../files/appsettings-file-disclosure.yaml | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 exposures/files/appsettings-file-disclosure.yaml diff --git a/exposures/files/appsettings-file-disclosure.yaml b/exposures/files/appsettings-file-disclosure.yaml new file mode 100644 index 0000000000..a84bb7a2e4 --- /dev/null +++ b/exposures/files/appsettings-file-disclosure.yaml @@ -0,0 +1,30 @@ +id: appsettings-file-disclosure + +info: + name: Application Setting file disclosure + author: DhiyaneshDK, tess + severity: high + description: appsetting.json file discloses the DB connection strings containing sensitive information. + reference: https://twitter.com/hacker_/status/1518003548855930882?s=20&t=BVauK0yUjVl5yL7rwy0Eag + tags: exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/appsettings.json" + + matchers-condition: and + matchers: + - type: word + words: + - "ConnectionStrings" + condition: and + + - type: word + words: + - "application/json" + part: header + + - type: status + status: + - 200