id: web-config info: name: Web Configuration File - Detect author: Yash Anand @yashanand155,DhiyaneshDK severity: info description: Web configuration file was detected. reference: - https://github.com/imhunterand/ApachSAL/blob/main/assets/exploits.json classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 metadata: max-request: 2 tags: config,exposure http: - method: GET path: - '{{BaseURL}}/web.config' - '{{BaseURL}}/../../web.config' matchers-condition: and matchers: - type: word words: - - condition: and - type: status status: - 200 # digest: 490a00463044022062cb4369acebf629ecb0a6bf788d7088c3237f06385b1f56a8c74ca8ad6d2d4802204afaa05d20bc9a4c5c3e211dfbe988e6c33681fd658aa9e00544e8c7c4019e9f:922c64590222798bb761d5b6d8e72950