id: production-logs info: name: Discover production log files author: geeknik severity: info description: Production log file was exposed. metadata: max-request: 3 tags: exposure,logs,rails http: - method: GET path: - "{{BaseURL}}/log/production.log" - "{{BaseURL}}/logs/production.log" - "{{BaseURL}}/production.log" matchers-condition: and matchers: - type: word words: - "Connecting to database specified by database.yml" - "Started GET" condition: and - type: status status: - 200 - type: word part: header words: - "text/html" negative: true extractors: - type: regex name: last_modified part: header regex: - 'Last-Modified:.*' # digest: 4a0a004730450220069d9de39e4fbf696ec729078008a9f91411dc7d037e66c89ff96e23c973bc02022100d29de74e008f3ca4ef3e4b650f02b572d184e0a9de3380eab4a37cb6b35b25ab:922c64590222798bb761d5b6d8e72950