nuclei-templates/http/exposures/files/svn-wc-db.yaml

43 lines
1.2 KiB
YAML

id: svn-wc-db
info:
name: SVN wc.db File Exposure
author: Hardik-Solanki,R12W4N
severity: medium
description: SVN wc.db file is exposed.
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
- https://infosecwriteups.com/indias-aadhar-card-source-code-disclosure-via-exposed-svn-wc-db-c05519ea7761
classification:
cpe: cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: apache
product: subversion
google-query: intitle:"index of" "wc.db"
tags: msf,exposure,svn,config,files
http:
- method: GET
path:
- "{{BaseURL}}/.svn/wc.db"
- "{{BaseURL}}/wc.db"
stop-at-first-match: true
max-size: 10000
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SQLite format'
- 'WCROOT'
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100c79c1f3bd981203f5a2f4d6caee7ecd23d126216523d8728a3f1d9f95b20703f02202a62693f5cd6bcbc0573acd14a25f5d4bc62f53719a57ec7f543870f6ae42496:922c64590222798bb761d5b6d8e72950