Improving descriptions (#9048)
parent
52ef767133
commit
bc89f2ee75
|
@ -2,6 +2,7 @@ id: ds-store-file
|
|||
|
||||
info:
|
||||
name: Exposed DS_Store File
|
||||
description: A .DS_Store file was found. This file may contain names of files that exist on the server, including backups or other files that aren't meant to be publicly available.
|
||||
author: 0w4ys,pwnhxl
|
||||
severity: info
|
||||
reference:
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
id: django-debug
|
||||
|
||||
info:
|
||||
name: Django Debug Method Enabled
|
||||
name: Django Debug Configuration Enabled
|
||||
author: dhiyaneshDK,hackergautam
|
||||
severity: medium
|
||||
description: Django Debug Method is enabled.
|
||||
description: Django debug configuration is enabled, which allows an attacker to obtain system configuration information such as paths or settings.
|
||||
metadata:
|
||||
max-request: 1
|
||||
tags: django,debug,misconfig
|
||||
|
@ -26,4 +26,4 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 404
|
||||
# digest: 4a0a0047304502200c0a545535be6f1e5900164dda6fdccd4ccccd7560a8d63a04974313f07f798a022100e4de2e75d131f5519a59e17abec3140b8751fb5cb7f5ebcad1cf0beb3e326c90:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502200c0a545535be6f1e5900164dda6fdccd4ccccd7560a8d63a04974313f07f798a022100e4de2e75d131f5519a59e17abec3140b8751fb5cb7f5ebcad1cf0beb3e326c90:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Server Status Disclosure
|
||||
author: pdteam,geeknik
|
||||
severity: low
|
||||
description: Server Status is exposed.
|
||||
description: Apache Server Status page is exposed, which may contain information about pages visited by the users, their IPs or sensitive information such as session tokens.
|
||||
metadata:
|
||||
max-request: 1
|
||||
tags: apache,debug,misconfig
|
||||
|
@ -33,4 +33,4 @@ http:
|
|||
- "Apache Server Status"
|
||||
- "Server Version"
|
||||
condition: and
|
||||
# digest: 4b0a00483046022100b1d7367f280fcefee5a7187a5fb87a1593b22b0aaee129adbc613fe55558c3c702210089576edace1c1b6aef9abe9bb6199c0dee699be2afec2297597657eb9989ce0b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b1d7367f280fcefee5a7187a5fb87a1593b22b0aaee129adbc613fe55558c3c702210089576edace1c1b6aef9abe9bb6199c0dee699be2afec2297597657eb9989ce0b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Error based SQL injection
|
||||
author: geeknik
|
||||
severity: critical
|
||||
description: Detects potential SQL injection via error strings in 29 database engines. Inspired by https://github.com/sqlmapproject/sqlmap/blob/master/data/xml/errors.xml.
|
||||
description: A SQL injection vulnerability was identified based on an error message returned by the server.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Generic Linux - Local File Inclusion
|
||||
author: geeknik,unstabl3,pentest_swissky,sushantkamble,0xSmiley,DhiyaneshDK
|
||||
severity: high
|
||||
description: Generic Linux is subject to local file Inclusion on searches for /etc/passwd on passed URLs.
|
||||
description: Generic Linux is subject to Local File Inclusion - the vulnerability was identified by requesting /etc/passwd from the server.
|
||||
reference: https://github.com/imhunterand/ApachSAL/blob/main/assets/exploits.json
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
|
|
Loading…
Reference in New Issue