nuclei-templates/http/exposures/configs/phpinfo-files.yaml

66 lines
1.9 KiB
YAML

id: phpinfo-files
info:
name: PHPinfo Page - Detect
author: pdteam,daffainfo,meme-lord,dhiyaneshDK,wabafet,mastercho
severity: low
description: |
PHPinfo page was detected. The output of the phpinfo() command can reveal sensitive and detailed PHP environment information.
remediation: Remove PHP Info pages from publicly accessible sites, or restrict access to authorized users only.
classification:
cwe-id: CWE-200
metadata:
max-request: 22
tags: config,exposure,phpinfo
http:
- method: GET
path:
- "{{BaseURL}}/php.php"
- "{{BaseURL}}/php2.php"
- "{{BaseURL}}/phpinfo.php"
- "{{BaseURL}}/info.php"
- "{{BaseURL}}/infophp.php"
- "{{BaseURL}}/php_info.php"
- "{{BaseURL}}/test.php"
- "{{BaseURL}}/i.php"
- "{{BaseURL}}/p.php"
- "{{BaseURL}}/pi.php"
- "{{BaseURL}}/asdf.php"
- "{{BaseURL}}/pinfo.php"
- "{{BaseURL}}/phpversion.php"
- "{{BaseURL}}/time.php"
- "{{BaseURL}}/index.php"
- "{{BaseURL}}/temp.php"
- "{{BaseURL}}/old_phpinfo.php"
- "{{BaseURL}}/infos.php"
- "{{BaseURL}}/linusadmin-phpinfo.php"
- "{{BaseURL}}/php-info.php"
- "{{BaseURL}}/dashboard/phpinfo.php"
- "{{BaseURL}}/_profiler/phpinfo.php"
- "{{BaseURL}}/_profiler/phpinfo"
- "{{BaseURL}}/?phpinfo=1"
- "{{BaseURL}}/l.php?act=phpinfo"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "PHP Extension"
- "PHP Version"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '>PHP Version <\/td><td class="v">([0-9.]+)'
# digest: 490a0046304402200ae8b8081d9f0cd03df17ae4d573d34a11bac4e910d19751ffc7c4b0f6c0df5f022021f374c3bca8e90d30151ec3730cda9d59f290607f7d4069cef189e0f4775ea4:922c64590222798bb761d5b6d8e72950