id: zend-config-file info: name: Zend Configuration File author: pdteam,geeknik,Akokonunes severity: high description: Zend configuration file was exposed. metadata: max-request: 13 tags: config,exposure,zend,php http: - method: GET path: - "{{BaseURL}}{{paths}}" payloads: paths: - "/application/configs/application.ini" - "/admin/configs/application.ini" - "/application.ini" - "/aplicacao/application/configs/application.ini" - "/cloudexp/application/configs/application.ini" - "/cms/application/configs/application.ini" - "/moto/application/configs/application.ini" - "/Partners/application/configs/application.ini" - "/radio/application/configs/application.ini" - "/seminovos/application/configs/application.ini" - "/shop/application/configs/application.ini" - "/site_cg/application/configs/application.ini" - "/slr/application/configs/application.ini" stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - "db.*(.password).*=" - "db.*(.username).*=" condition: and - type: word words: - "text/plain" part: header - type: status status: - 200 # digest: 4a0a00473045022100ed7e0d3228fec8d4bb5754e4afd1954279621dffc883a5b1b6a271db02b85dc402206b216930d17602c975902b431a94f3543fc92376b32a180514334c68c8ede3cc:922c64590222798bb761d5b6d8e72950