id: sphinxsearch-config info: name: Sphinx Search Config - Exposure author: gtrrnr severity: high description: sphinx.conf file contains SQL credentials and is publicly accessible. impact: | An attacker can use leaked credentials to gain access to database. reference: - https://github.com/manticorp/SphinxSearch/blob/master/sphinx.conf.example metadata: verified: true max-request: 7 tags: sphinx,sphinxsearch,exposure,config http: - method: GET path: - "{{BaseURL}}/config/development.sphinx.conf" - "{{BaseURL}}/config/production.sphinx.conf" - "{{BaseURL}}/configs/sphinx.conf" - "{{BaseURL}}/search/configs/sphinx.conf" - "{{BaseURL}}/sphinx.conf" - "{{BaseURL}}/sphinx/sphinx.conf" - "{{BaseURL}}/sphinxsearch/sphinx.conf" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "sql_user" - "sql_pass" - "indexer" condition: and - type: status status: - 200 # digest: 4b0a00483046022100abd19b2bc181c6d51189231ccfcda8b95cf2a120a50d095cc622da6df3efb399022100c5e310e6189dc137f15d8741736a9e57b3b44b8f0b80e9990872ffa7419883cb:922c64590222798bb761d5b6d8e72950