id: sphinxsearch-config info: name: Sphinx Search Config - Exposure author: gtrrnr severity: high description: sphinx.conf file contains SQL credentials and is publicly accessible. impact: | An attacker can use leaked credentials to gain access to database. reference: - https://github.com/manticorp/SphinxSearch/blob/master/sphinx.conf.example metadata: verified: true max-request: 7 tags: sphinx,sphinxsearch,exposure,config http: - method: GET path: - "{{BaseURL}}/config/development.sphinx.conf" - "{{BaseURL}}/config/production.sphinx.conf" - "{{BaseURL}}/configs/sphinx.conf" - "{{BaseURL}}/search/configs/sphinx.conf" - "{{BaseURL}}/sphinx.conf" - "{{BaseURL}}/sphinx/sphinx.conf" - "{{BaseURL}}/sphinxsearch/sphinx.conf" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "sql_user" - "sql_pass" - "indexer" condition: and - type: status status: - 200 # digest: 490a0046304402202c5da2de0218938f606215884c5d06d4df9d871fd713ae605be69a28f8751ab502203d0afa6d4621b7c3bf58071143df4bebb21d0edb887395d4eca6c7c7c8b7e386:922c64590222798bb761d5b6d8e72950